What does a WLAN use to transmit data to clients

Answers

Answer 1

Here's link to the answer:

tinyurl.com/wpazsebu


Related Questions

How is this a SyntaxError?(python3)

Answers

Answer:

1 bracket, instead of 2 is closed in line 9

Explanation:

Given

The attached code

Required

Why is line 10 a syntax error?

The error points to line 10.

From the attached code, the line 9 is:

amount = int(input("Enter cheese order weight: ")

When converting an input to integer, the syntax is:

variable = int(input("Prompt"))

But, only 1 bracket is closed in the program, where 2 is required.

This is definitely a syntax error

Answer: theres only one bracket

Explanation: got it right on edgen

3.Choose the correct container for sugar
A:bag of sugar
B:Can of sugar​

Answers

Answer:

bag of sugarrrrrrrrrrr

Answer:

The answer is A. bag of sugar

How do you think electronic spreadsheets have transformed businesses today?​

Answers

this is kinda your opinion but many other people are using it whether it is to stay organized at school or work and some people use it for outside of school or work

Would be easier to divide/fold a rectangular sheet of paper into 22 equal pieces or 24 equal pieces? Explain your answer. Please help !!!!!

Answers

Answer:

24 equal.

Explanation:

Discuss any five factors that hinder the application of computer application in business organization

Answers

Answer:

Many factors can cause inderdce to the application of computer application in any business organization

Explanation:

Various factors affect and hinder the use of computers in the business scenario such as Time and cost, that is business think that new and different computer application is a waste of time and money.   lack of training of employees, most of the emptied are not properly trained and lack professionalism. Old and primitive software that cannot be replaced, due to the old tools and methodologies of the company the business may not feel the need to change. Risks of hacking and data leak, as new software, can contain hidden costs which may destroy or leak information or may be more vulnerable to risks. Low financial support, such as new startup or a low-paying corporation.

Here is the API for a robot library.
// moves the robot forward
function moveForward();

// turns the robot to the left
function rotateLeft();

// turns the robot to the right
function rotateRight();

// checks if a robot can move in any direction
// direction {string} - the direction to be checked
// return {Boolean} - true if the robot can move in that direction, otherwise returns false
function canMove(direction);
Which code segment will guarantee that the robot makes it to the gray square without hitting a wall or a barrier (black square)?



A.
B.
C.
D.

Answers

Answer:

hi

Explanation:

Activity in September 2014, the Federal Bureau of Investigation (FBI) announced that is next generation Idenufication system was fully functional The FBI named it the integrated Automated Fingerprint Identification system (IAFIS), Conduct online research on this system and answer the following questions 1. Which elements can be stored in IAFIS? 2. What is the response time of this system? 1. How has this system benefited the FBI​

Answers

Answer:

(Answers may vary.)

In addition to fingerprints, IAFIS stores criminal histories, mug shots, and physical information like scars, tattoos, eye color, hair color, weight, and height. It also stores fingerprints of individuals who are or were employed by the US military and the federal government.

The system’s average response time for criminal fingerprint processing is about 27 minutes. Civil fingerprint processing takes over an hour.

Previously, the tenprint submission and identification was a manual, tedious process. It took the FBI weeks or months to process a single fingerprint submission. IAFIS has automated this process and added advanced identification capabilities. The submission and processing takes just few minutes. This has helped the FBI solve and prevent crime and tighten holds on criminals and terrorists.

Explanation:

9. Differentiate between bolding and highlighting
text.
(2 marks)​

Answers

Answer:

Highlighting Text

- Highlighting text allows a user to move, copy, or cut that selected text. Highlighting an object, such as an icon, also allows it to be cut, copied, deleted, moved, viewed, opened, or otherwise manipulated.

Bolding Text

- A set of type characters that are darker and heavier than normal. A bold font implies that each character was originally designed with a heavier appearance rather than created on the fly from a normal character.

Explanation:

I hope it can help

I'm just putting this because I need to answer a question and I know nothing:)

Fill in the blank with the correct response. Wanting to become a better archer is a what?

Answers

Is a better archer shooter

HOW CAN YOU GET THE COOLEST FONTS ON GOGGLE SLIDES???

Hint: Im looking for like bubble letters or like stuff to like install for goggle slides, now mind u i do have a/am using a Chromebook so ya

Answers

i would love to help. but if you could text my number i could help more. i have a chromebook

Answer:

mhmm. you can go to www.bubbleimages.com

Explanation:

When you insert a copy of Excel data into a Word document the data is __________ in the Word document

Answers

Answer:

I don't know if I get a chance to get through

Does anyone know how to do 8.3 Code Practice on Edhesive?

Answers

Answer:

nums = [14, 36, 31, -2, 11, -6]

print(nums)

Explanation: That should be 100%.

The Code Practice on Edhesive will be represented with the language of python language. there will be arrays and lists that will be presented. Thus, option A is correct.

What is code?

A collection of commands that will be presented is referred to as computer code. It's also the name that was given to the source code.  The translator has prepared for computer execution that will be presented.

Code is usually presented with a focus on producing various code-correct internet, application forms as well as a phone application.

The inputs will be

numbers = input()

Splits of numbers will be presented as

numList = numbers.split(' ')

Iterates will be presented with the list:

for i in range(len(numList)):

Conversion of every agreement will be;

 numList[i] = int(numList[i])

The final line will be:

print(numList)

Learn more about code, here:

https://brainly.com/question/20712703

#SPJ6

The question is incomplete, Complete question probably will be  is:

8.3 code practice adhesive

Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the array.

14 36 31 -2 11 -6

Sample Run

[14, 36, 31, -2, 11, -6]

Can someone tell me how this is a SyntaxError! (Python3)

Answers

Answer:

The expression on line 9 required 2 brackets

Explanation:

Given

The attached code

Required

Why syntax error.

The error points to line 10, but the error is actually from line 9

To get an integer input, the syntax is:

variable-name = int(input("Prompt"))

From the attached code, the line 9 is:

amount = int(input("Enter cheese order weight: ")

By comparing the syntax to the actual code on line 9, only 1 of the brackets is closed.

This, in Python 3 is a sytax error

Answer: it needs two brackets

Explanation: got it right on edgen

Which option is a means of reporting events via the Internet? O A. Taking photos to upload O B. Browsing for fun O C. Downloading music videos D. Searching with search engines​

Answers

Answer:

your answer is A!

Explanation:

photos are often a great form of proof or example material when reporting something over the web!

In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. What happens if any transaction data is changed or modified in the earlier existing blocks?

Answers

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

This is your code.
>>> a = [5, 10, 15]
>>> b = [2, 4, 6]
>>> c = [11, 33, 55]
>>> d = [a, b, c)
b[1:2] is

Answers

Answer:

got no answr...help me with it

Answer:

6

Explanation:

Complete the sentence with the correct response. In a two-way selection, if the initial statement is evaluated as , the code skips to the ELSE command.

Answers

Answer:

True.

The code skips the else command

Explanation:

I will answer this question with the following code segment

n = 1

If n > 0:

  Print("greater than 0")

else:

  Print("not greater than 0")

From the code segment above

Print("greater than 0") will be executed because the condition If n > 0 is true

Since the if condition is true, the else condition will not be executed

How can HTML be used to express personal value?

Answers

Hypertext Markup language could be described as a computer language which is used to texts and documents used on web pages. With these capability, it offers a platform to make an impression.

Websites are avenues express ideas, views and motives. It serves as a platform to make one's voice heard. It also serves as a marketing platform to make sales and enhance business growth.

Therefore, Hypertext Markup language, markdowns and other computer languages are means of expressing personal values and development.

Learn more : https://brainly.com/question/22645163

___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

Answers

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

A cola container is in the shape of a right cylinder. The radius of the base is 4 centimeters, and the height is 12 centimeters. What is the volume of the container? A. B. C. D.

Answers

Answer:

Volume of cylinder = 603.42 cm² (Approx.)

Explanation:

Given:

Radius r = 4 cm

Height = 12 cm

Find:

Volume of cylinder

Computation:

Volume of cylinder = πr²h

Volume of cylinder = (22/7)(4)²(12)

Volume of cylinder = 603.42 cm² (Approx.)

Answer:

It is B, also know as 192π cm3

Explanation:

Will this website ever get itself together to stop people from sending links?

Answers

Answer:

no

Explanation:

this not a queston but a warning

if you see a tnyInk link DO NOT DOWNLOAD THE FILE IN IT they most likley contain malware and if you see that link in a comment report it please it will help. and also show this to your freinds or someone.

Answers

okay. epic swag man. z

write 3 things that can't be done without technology. write your opinion?

Answers

Answer: Call a theater to get movie times, Use a phone book to find a company to do work around your house, and Park your used car on the street with a sign that says it’s for sale.

Explanation: my opinion is that it's fine to do each of those things without technology. Because technology is supposed to help the limited capacity of the human brain and improve things that make every day life quicker, easier, leaves more time to do something else.

Answer:

1) Filming, depending on the camera it is still technology that everyone uses on a daily bases with no hesitation for use.

2) Vehicles, I'm not sure if they are a type of technology but for this case lets just say they are. With vehicles we can get to places much faster then walking or taking a carriage.

3)Records, in this case music. Without records or anything of the sort we wouldn't exactly be able to listen to our favorite music at all times.

while
norma
mean
cinta
to the user
a.) Define the term microcomputers.​

Answers

Explanation:

Microcomputers are computers designed around a microprocessor, smaller than a minicomputers or a mainframes.

Hope it will help :)❤

No matter what your fitness level is, you need to exercise more than 20 minutes to get any health or fitness benefit.
A.
True
B.
False


THE ANSWER IS FALSE!!!!!

Answers

Answer:

f

Explanation:

Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to upload this picture wothout the mirrored effect.
To correct the mirroring text, Philip can (flip, crop, distort) the picture (vertically, horizontal, diagonally).

Answers

Answer: flip the picture vertically

Explanation: horizontally would make it upsidedown. And diagonally isn’t right either.

what is the deck of a suspension bridge called​

Answers

Answer:

that would be the tension in the cables and compression in the towers I believe, my aunt and my uncle work on technology stuff and I'm learning from them.

what is computer memory measured in​

Answers

Answer:

MB I think I learned it actually.

Explanation:


8. (a) Identify two advantages and four limitations of the Speech recognition devices.

Answers

Explanation:

Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it

Consider the following code:
x = "apple"
y = x
z = "banana"
print(x + " " + y + "\n" + 2)

Answers

Answer:

apple apple

banana

Explanation:

Given - Consider the following code:

x = "apple"

y = x

z = "banana"

To find - print(x + " " + y + "\n" + z)

It will print -

apple apple

banana

First will apple followed by '' '' that is space then y which is equal to x that is apple then followed by ''\n'' new line then banana.

So, The answer would be

apple apple

banana

Notation used -

'' '' represents space between two values

''\n'' represents new line

Other Questions
solve for x. 150 degrees and 5x _____________________ can declare war on another country. *10 points1.State governments2.The Federal government3.American citizens4.A governor Divide: 407:10 Guys I need help I dont know how to do divide SOMEONE HELP ME QUICKLY!!! Consider the following story:During the summers when Xavier was a young boy (around 8 years old), his grandfather would take him to northern Ontario to go fishing on weekends. Shortly after his grandfather died his family left Ontario. He was never able to clearly remember the fishing trips. When he was 30 years old he moved back to Ontario with his wife. One weekend they decided to take a trip to northern Ontario to spend the weekend at a resort on one of Ontarios many lakes. When they got out of the car, they were overwhelmed by the aromatic smell of the trees in the heavily wooded area by the lake. Suddenly, memories of the wonderful weekend fishing trips with his grandfather came flooding back to the him.Discuss the following questions:Is this an example of a repressed memory? If not, why not?If its not a repressed memory, then what is it? What accounts for the sudden re-emergence of this buried memory?Could this account for other, more traumatic, kinds of repression as well? For the past 10 days, a city planner has counted the number of northbound cars that pass through a particular intersection. During that time, 200 or more cars were counted 9 out of 10 days. What is the experimental probability that there will be 200 or more northbound cars passing through the intersection on the eleventh day? Explain why it is impossible to have a temperature value less than 0 K. As a delivery truck travels along a level stretch of road with constant speed, most of the power developed by the engine is used to compensate for the energy transformations due to friction forces exerted on the delivery truck by the air and the road. If the power developed by the engine is 4.12 hp, calculate the total friction force acting on the delivery truck (in N) when it is moving at a speed of 30 m/s. One horsepower equals 746 W. Suppose you know that S and Y are complementary, and that mS = 5(mY) 150. Find mY. A pipe is tested during a 6-hour leak test on 600 feet of 6-inch-diameter plastic pipe with a test pressure of 150 pounds per square inch (psi). The pipes are 10 feet long. During the 6-hour test period, 8 gallons of water were added to maintain the 150 psi pressure. What is the actual leakage from this section of pipe in gallons per hour per 100 joints? The real answer is 12 awnser these pls they r for middle schoolers lol On what grounds did the Supreme Court assert the power of judicial review in the case of Marbury v Madison?Group of answer choicesIf the Supreme Court did not overturn some laws, state governments would challenge unpopular laws on their own.Supreme Court justices are less subject to popular pressure than others since they are appointed for life.It is the role of the courts to interpret and apply the law, and the Constitution is the highest law.The Supreme Court is more neutral than either Congress or the President. what would be the best way to limit damage to the amazon river in brazil? Restrict oil drilling, coal mining, cattle ranching, or commercial farming 1.2. The following sum was answered by a gr 8 learner:5 x 9 + 6= 75Is the answer correct? Supply reasons. Over time the average rate of return on stocks is Who was elected president of the Confederacy? Select all the chord(s) in circle G. A planet with a mass one-half that of Earth has a radius that is 3 times that of Earth's radius. What is the gravitational field strength of the planet? what property ofwater is determinedby dissolved Ca2+,Mg2+ ions? how does condensation happen in the earth atmosphere?sorry for the subject btw.