1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
2 years ago
15

How was wifi made? bro

Computers and Technology
2 answers:
Colt1911 [192]2 years ago
4 0

Answer:

Once a transmitter receives data from the internet, it converts the data into a radio signal that can be received and read by WiFi enabled devices. Information is then exchanged between the transmitter and the device. When was WiFi invented? WiFi was invented and first released for consumers in 1997 when a committee called 802.11 was created.   i think-

Explanation:

Helen [10]2 years ago
3 0

Answer: "Once a Transmitter receives data from the internet, it converts the data into a radio signal that can be received and read by WIFI-enabled devices. When was WIFI invented? Wifi was invented and first released for consumers in 1997 when a committee called 802.11 was created."

(Non Of This Information Is Mine I Have No Rights Or Ownership Not For Plagiarism Purposes Information Based Only 2022.)

Explanation: ...

You might be interested in
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Who invented the first mechanical computer? in what year was it invented?.
Elodia [21]

Answer:

The first mechanical computer was invented by Charles Babbage in 1822.

6 0
2 years ago
If the audio has no sound:
Mice21 [21]

Answer:

B

Explanation:

the file to be transcribes should have an audio,it maybe a scam,so you have to file a report.

6 0
3 years ago
How many discussion posts must you complete to meet the Expectations of the replies category
Dennis_Churaev [7]

Answer:

I want to take this time to discuss a few expectations and helpful information about how to participate in the weekly online discussions. You can scroll down the page or use the links here to navigate to each section.  All Discussions can be found by clicking on the Discussions link located on the left-hand side of the course.

Explanation:

Participation in the discussion forums is critical for maximizing student learning in this course, both because your participation is graded and because it's a chance to engage in a dialogue about course material.  In this course, students are required to be a part of an online community of learners who collectively interact, through discussion, to enhance and support the professional performance of each other. Part of the assessment criteria for the course includes evaluating the quality and quantity of your participation in the discussion forum.

The TAS will facilitate student discussions, although they likely will not address every single post. In most cases, they might share a related idea, intervene when the discussion goes off-track, or tie student comments together to help deepen student learning.  Remember, if you have a specific question, pose

3 0
3 years ago
Which position is expected to be at the center of the action providing complete technology solutions for a business?
dedylja [7]

IT Manager is expected to be at the center of the action providing complete technology solutions for a business.

Explanation:

An Information Technology Manager (IT Manager) is responsible for implementing and maintaining an organization's technology infrastructure.

IT Manager Roles:

  • Monitors the organization's operational requirements
  • Manages the data center
  • Maintains information technology strategies
  • Manages staff
  • Maintains a safe and secure work environment
  • Initiates, coordinates, and enforces systems, policies, and procedures

Education and Experience Requirements:

  • Bachelor’s or master’s degree in a computer science
  • Five or more years of IT work experience
  • Optional product or system certification
4 0
4 years ago
Other questions:
  • I want to message someone on Brainly but it wont let me. How many questions do I need to answer before I could message?
    12·2 answers
  • How many of devices you identified inside the control room need to magnetism to operate
    9·2 answers
  • Which software application should be used when preparing a budget
    10·2 answers
  • How do different frequencies (color) of light affect a recorded video image?
    12·1 answer
  • How can parents be health educators in family​
    13·1 answer
  • Earthquakes happen when _____.
    12·1 answer
  • Can someone answer this ?
    7·1 answer
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select a
    5·1 answer
  • When formulating a linear programming model on a spreadsheet, the decisions to be made are located in the data cells.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!