answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
2 years ago
7

In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.

In a real-world situation, what is the more likely range involved
Computers and Technology
1 answer:
Svetradugi [14.3K]2 years ago
3 0
100 miles i assume since the avarge antanna cover 5-50 miles
You might be interested in
To gain experience of using and combing different sorting algorithms: election sort, insertion sort, merge sort, and quick sort.
ch4aika [34]

Answer:

Motivation? The search problem.

Sorting algorithms: insertion sort, shellsort, heapsort, mergesort, quicksort, bubblesort

At the very least, "general purpose" sorting algorithms require O(n log n) comparisons

Explanation:

3 0
2 years ago
array of String objects, words, has been properly declared and initialized. Each element of words contains a String consisting o
Vlad [161]

Answer:

for(String s:words)

   if(s.endsWith("ing"))

 System.out.println(s);

Explanation:

Create an enhanced for loop that iterates through the words array

Check if an element in words ends with "ing" using endsWith() method (Since it is said that strings are lowercase letters, we do not need to check it)

If you find one that ends with "ing", print the element

5 0
2 years ago
In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
maxonik [38]

Answer:

Putty

Explanation:

PuTTY is an SSH and telnet client for Windows and Unix platform. PuTTY is an open source terminal emulator, serial console and network file transfer application. It does not only support SSH and telnet, it also supports other network protocols like SCP, rlogin, and raw socket connection.

To make use of the SSH client on windows, you need to first download and then install the PuTTY software.

6 0
2 years ago
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no
elena55 [62]

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

4 0
2 years ago
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company ne
____ [38]

Answer:

The best cloud option for Widget Corp considering the cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.

Is a hybrid could.

Explanation:

The reasons behind this answer are that in the first place the cloud is not going to be fully managed by a third party, but also by the IT department of Widget Corp allowing it to control its security. Also, that the cloud can be adapted to public or mainstream sources, resources, and platforms. Making it very user friendly and lowering down specific knowledge to use it.

5 0
2 years ago
Other questions:
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • Write a method named quarterstodollars. the method should accept an int argument that is a number of quarters, and return the eq
    13·2 answers
  • Which table style option is useful to display aggregated data when it is checked? total row filter button last column header row
    8·1 answer
  • A router is involved in ____________ layers of the tcp/ip protocol suite.
    12·1 answer
  • Characteristics of a LAN include _____. can be connected to the Internet covers the most area of all networks does not have to b
    5·1 answer
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • Write the routines with the following declarations: void permute( const string & str ); void permute( const string & str
    14·1 answer
  • A Salesforce administrator adding a recommendations carousel component in Community Builder. The page displays correctly in Comm
    12·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
  • You are a high school student learning about computers and how to build them. As a class project, you have built a new computer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!