You purchase a new desktop computer that does not have wireless capability, and then you decide that you want to use a wireless connection to the Internet. What are the two least expensive ways (choose two) to upgrade your system to wireless

Answers

Answer 1

Answer:

hello the options to the question are missing here are the option

a. Trade in the computer for another computer that has wireless installed 4

b. Purchase a second computer that has wireless

c. Purchase a wireless expansion card and install it in your system

d. Purchase a USB wireless adapter and connect it to your PC by way of a USB  port

Answer : Purchase a wireless expansion card and install it in your system (c)

Purchase a USB wireless adapter and connect it to your PC by way of         a USB port ( d )

Explanation:

A wireless expansion card : A wireless Expansion card are added to a system via expansion slots. they are added to a system without a WiFi adapter and it is quite affordable

USB wireless adapter : A USB wireless adapter overrides the computer's built-in wireless function of a system and it gives a faster and more reliable connection via the USB ports.


Related Questions

If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
A. DANMAT certificate
B. DANSUB certificate
C. HAZMAT certificate
D. CHEMMAT certificate

Answers

Answer:

HAZMAT certificate

Explanation:

If you face an investigation where dangerous substances might be around, you may need to obtain a HAZMAT certificate.

Hazmat is the shortened form of the word "hazardous materials," which the United State Department of Transportation recognized as materials that could adversely affect people and also the environment. Hazmat certification is required to be obtained by workers who remove, handle, or transport hazardous materials. This comprises careers in transportation and shipping, firefighting and emergency rescue, construction and mining, as well as waste treatment and disposal. Workers who are also in manufacturing and warehouse storage may also come across hazardous substance or materials risks while on their jobs. Certification involves having the knowledge of the risks and safety measures for handling these materials.

Answer:

(C) HAZMAT certificate

Explanation:

HAZMAT stands for Hazardous Materials. These are materials that could adversely affect people and the environment. Examples are synthetic organic chemicals, heavy metals and radioactive materials. People who work in certain industries such as construction and mining, firefighting, waste treatment and disposal e.t.c, are required to have this certificate.

The certification involves training workers in these industries in the use of, risk involved, and way of handling of these materials when they are encountered at work.

The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if the program solves the original problem To correct syntax errors To correct runtime errors

Answers

Answer:

To determine if the program solves the original problem

Explanation:

Required

Essence of validating a program

From list of given options, only the above option best describes the given illustration.

When a program is validated, it means that the results of the program are tested to meet the requirements of the user;

For a program to be validated, it means it has passed the stage of error checking and correction; whether syntax or run time errors;

However, when modifications are made, the program will need to be re-validated to ensure that it comports with its requirements.

The CPU control unit is responsible for A. obtaining instructions B. interpreting instructions C. all logic functions D. both A and B

Answers

Answer:

D. Both A and B

Explanation:

Because it controls the input and output of data, check the signals have been delivered successfully, and make sure that data goes to the correct place at the correct time.

Which operating system problem might cause the desktop background to change
unexpectedly? Choose the answer.
A boot failure
B startup loop
C malware D incompatibility

Answers

It should be noted that the operating system problem that might cause the desktop background to change is D incompatibility.

What is operating system problem?

The operating system problem serves as those error that can affect the operation of the operating system in computer.

This System errors are caused by malfunctioning hardware components as well as corrupted operating system modules and one of this is compatibility.

Learn more about operating system problem at;

https://brainly.com/question/17506968

)You have been asked to do voice-overs and ""wild lines"" for a film. What is your position on the film crew? Boom operator Sound board operator Production sound mixer Sound designer

Answers

Answer:

Sound designer.

Explanation:

A boom operator is responsible for positioning of the microphone.

A sound board operator is responsible for playing pre-recorded sound effects.

A production sound mixer records all sounds on the set.

A sound designer creates and edits new sounds.

In conclusion, it must be a sound designer as this best fits the role.

Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions. How much faster should we run the floating-point instructions to execute entire program 1.25 times faster

Answers

Answer:

the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

Explanation:

Given that:

a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions.

Let the integer be the total execution time = V

The  floating-point instructions = 60%

The integer instruction = 40%

The time spent on the floating-point instruction = 60/100 × V

= 0.6 V

The time spent on t he integer instruction = 40/100 × V

= 0.4 V

However; How much faster should we run the floating-point instructions to execute entire program 1.25 times faster

If we are to execute the entire program 1,25 times faster;

The new execution time = V/1.25

Assuming the new time spent on floating-point instruction = W

W + 0.4 V = V/1.25

W = V/1.25 - 0.4 V

W = (V - 0.5V)/1.25

W = 0.4V

the new time spent on floating-point instruction = W = 0.4 V

The speed required to make the floating -point instruction to run faster = 0.6V/.4 V

= 1.5

Hence,  the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and engaged communities" that help a game's chance of success.
a. true
b. false

Answers

Answer:

The statement is False.

Explanation:

In his article published on the 31st Aug 2010, Patrick suggests that a 100% penetration rate for any market is now possible due to the growth of the use of mobile phones.

The strategy of accessing the market using mobile ads, according to Patrick, is called Mobile Marketing.

In his article, Patrick provides statistics which help buttress his position that a good number of mobile phone users are ready to respond positively to mobile ads.

While it is implied that this concept has increased the chances of mobile games as a product being successful, nowhere in the article did Patric mention "games".

Cheers!

the typing area is bordered on the right side by bars in ms word

Answers

Answer:

Explanation:

PTA NHI

TLS does not require mutual authentication. Only server must authenticate its public key to the client. Client is authenticated by the application via a password. The most common way for public key authentication would be a. a photo ID. b. a password. c. a certificate. d. biometrics.

Answers

Answer:

c. a certificate.

Explanation:

Public key infrastructure authentication is intended to make transactions occurring through the internet as secure as possible. Public keys are usually assigned to entities like business firms or individuals, and digital certificates are given to them as proof that they have been authenticated.

A certificate authority has the role of signing, storing, and issuing digital certificates. A software or humans could be charged with the responsibility of actually ensuring a key to user binding if all conditions are satisfied.

The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:

a. in multiple sessions of communications one after the other. For example, if someone has 12 keys, they can use it for twelve video calls one after the other.
b. such that one of them is picked up at random at a time.
c. some as private keys, some as public keys.
d. for different rounds of encryption for the same plaintext to strengthen the cipher.

Answers

Answer:

Option(d) is the correct answer to the given question .

Explanation:

There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The  main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.

The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.The Option (b) is wrong because In the key scheduling  we do not used the  the random key for the encryption process .The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.

When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
​B. Baseline
​C. Forensic log
D. Vulnerability assessment

Answers

Answer:

The answer is "Option B".

Explanation:

The Baseline measurement is an essential characteristic of effective coal company monitoring programs to assess the degree of mining effects and keep on improving effect monitoring the system will continue to be modified via periodical analyses, and the wrong choices can be defined as follows:

In choice A, it is wrong because it used in 3D printing technology. In choice C, it is used to analyze the log entities, that's why it is wrong. In choice D, it is used to analyze the security weaknesses, that's why it's wrong.

Consider the following statements. If the input is 95, the output of the following code will be: #include #include using namespace std; int main () { float score; string grade; cin >> score; grade = "Unknown"; if (score >= 90) grade = "A"; if (score >= 80) grade = "B"; if (score >= 70) grade = "C"; else grade = "F"; cout << grade; }

Answers

Answer:

The output will be "C"; without the quotes

Explanation:

Given

The program above

Required

What will be the output if user input is 95

The output will be 95;

Analysis

1. Initially, grade = "Unknown"

grade = "Unknown";

2. Because user input is greater than 90, grade changes its value from "Unknown" to: grade = "A"

if (score >= 90)

grade = "A";

2. Because user input is greater than 80, grade changes its value from "A" to: grade = "B"

if (score >= 80)

grade = "B";

3. Because user input is greater than 70, grade changes its value from "B" to: grade = "C"

if (score >= 70)

grade = "C";

4. This will not be executed because it specifies that if user input is less than 70; Since, this statement is false; the value of grade is still "C"

else grade = "F";

5. The value of grade is printed

cout << grade;

Jamal likes the theme he has chosen, but he wants to make his presentation more interesting before he saves it. Which command group does he need to complete the tasks listed?

Answers

Answer: Variants

Customize

Explanation:

Answer:

Variants and customize, I took the quiz just now

Explanation:

On a system with paging, a process cannot access memory that it does not own. Why? How could the operating system allow access to other memory?

Answers

Answer:

Because the page is not in its page tableThe operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table

Explanation:

On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.

The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange  data can efficiently do that . i.e creating a very efficient inter-process communication

Given a variable s that contains a non-empty string, write some statements that use a while loop to assign the number of lower-case vowels ("a","e","i","o","u") in the string to a variable vowel_count.

Answers

Answer:

Following is the program in the python language

s="Hellooo" #string initialization

k=0 # variable declaration

vowel_count=0 #variable declaration

while k<len(s): #iterating the loop

   c1=s[k] #store in the c1 variable  

   if c1=='a' or c1=='e' or c1=='i' or c1=='o' or c1=='u': #check the condition

       vowel_count= vowel_count +1; # increment the variable vowel_count  

   k = k+1

print(vowel_count) #display

Output:

4

Explanation:

Following is the description of program

Create the string "s" and store some characters on them.Declared the variable "k" and initialized 0 on them .Declared the variable "vowel-count" and initialized 0 on them .Iterating the while loop ,inside that loop we shifted the string "s" into the " c1" variable and checking the condition in the if block by using or operator if the condition is true then it increment the "vowel_count"  variable by 1 .Finally outside the loop we print the value of "vowel_count".

It's not possible to die in an alcohol-related collision if you're not in an automobile.
A. True
B. False

Answers

Answer:

B. False

Explanation:

Consumption of alcohol is not a good practice and is generally not allowed at the time of driving an automobile and is considered to be an offense as it may be injurious to health and property. As too much alcohol can create possible chances of collusions and even if the person is not in an automobile can result in a collision if tries to cross the road. Like head injuries or leg injuries can occur.

CHALLENGE ACTIVITY 2.15.1: Reading and outputting strings. Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones Jones, Maya.

Answers

Answer:

Following are the program in Java language

import java.util.*; // import package

public class Main  // main function

{

public static void main(String[] args)  // main class

{

    String l_name,f_name; // variable declaration

    Scanner sc6=new Scanner(System.in); // scanner class

   f_name= sc6.next(); // Read input

 l_name=sc6.next(); // Read input

 System.out.print(l_name); // display last name

  System.out.print(","); // display comma

   System.out.println(f_name); // display first name

}

}

Output:

Maya Jones

Jones, Maya

Explanation:

Following are the description of program

Declared a variable  'l_name","f_name" as the string type .Create the instance of scanner class i.e "sc6".Read the user input by using the instance "sc6" of the scanner class in the variable "l_name" and "f_name ".Finally by system.print() method we will display the value according to the format in the given question .

How to fix the acount when it says "Uh oh, this account has been restricted because of an unusual amount of activity.

Answers

Answer:

Make sure that the email is verified. Also, usually sites do this when there are multiple log ins on multiple devices. It makes the site think that you are in multiple places at once making it seem suspicious. What i would do is clear cache and change the email and password associated with the account. If all fails contact brainly support

Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to automate the process.
A. mail merge
B. data source
C. mailing list
D. form letter
ONLY ANSWER IF YOU'RE 100% SURE.

Answers

Answer:

A. Mail Merge

Explanation:

I had this question last year

Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N down to and excluding 0. If N is negative, then output every value from N up to and excluding 0.

Answers

Answer:

Following are the answer to this question:

x=int(input("Enter number: "))#defining x variable that input value from user end

if x< 0:#defining if block that check x value is less then 0

   while x<0:#defining while loop print up to the value

       print(x)#print value

       x+= 1#add values by 1

elif x>0:#defining elif block to check value x is greater than 0

   while x>0:#defining while loop to print down to value

       print(x)#print value

       x-= 1#subtract value by 1

Output:

when input is a positive value

Enter number: 5

5

4

3

2

1

when input is a negative value

Enter number: -5

-5

-4

-3

-2

-1

Explanation:

In the given python code, x variable is declared that input the value from the user end, in the next step if and elseif block is declared that calculates and prints its value. In the if block, it checks value is negative it uses the while loop to prints its values in the down to value form. In the elif block, it checks the positive it uses the while loop to prints its values into the up to values form.  

Drug addiction occurs in
age groups, from a
variety of backgrounds.
A. young, narrow
B. all, narrow
C. all, wide

Answers

Answer:

ig the answer is C :) sorry if isn't correct

any element that has a starting tag and does not have a closing tag is called a ?
pls be quick guys​

Answers

Answer:

Any element that has a starting tag and doesn't have a closing tag is called a empty element.

:)

Eight-queen's problem Consider the classic puzzle of placing eight queens on an 8 x 8 chessboard so that no two queens are in the same row or in the same column or on the same diagonal. How many different positions are there so that
no two queens are on the same square?
no two queens are in the same row?
no two queens are in the same row or in the same column?
Also, estimate how long it would take to find all the solutions to the problem by exhaustive search based on each of these approaches on a computer capable of checking 10 billion positions per second.

Answers

Answer:

12 solutions16,777,21640320 ways

Explanation:

A) No two queens on the same square

Placing eight queens on an 8 * 8 chessboard has a total of 92 Separate   solutions but unique 12 solutions

The total no of possible solutions using the computational method is

= 64! / (56! * 8! ) ~ 4:4 * 109

but since there are 12 unique solution out of the 92 therefore

B) No two queens are in the same row

= 8^8 = 16,777,216

C) No two queens are in the same row or in the same column

= 8! = 40320 ways

It will approximately take less than a second for a computer with the capability of checking 10 billion positions per second to find all the solutions

When Adobe Photoshop was released for the first time? A: 1984 B: 1990 C: 1991 D: 1992

Answers

Answer:

B

Explanation:

Write a program that inputs a sentence from the user (assume no punctuation), then determines and displays the unique words in alphabetical order. Treat uppercase and lowercase letters the same.

Answers

Answer:

Following are the code to this question:

val={} #defining dictionary variable val

def unique_word(i):#defining a method unique_word    

   if i in val: #defining if condition to add value in dictonary          

       val[i] += 1#add values  

   else: #defining else block to update values        

       val.update({i: 1})#updating dictionary

s =input('Enter string value: ') #defining s variable for input string value

w=s.split()#split string value and sorte in w variable

w.sort() #sorting the value  

for i in w: #defining loop for pass value in method unique_word

   unique_word(i)#assign value and calling the unique_word method

for j in val:# defining for loop to print dictionary value  

   if val[j] == 1: #defining if block to check value is unique  

       print(j) #print value

Output:

Enter string value: my name is dataman

dataman

name

is

my  

Explanation:

In the above python code, a dictionary variable "val" is declared, which is used in the method "unique_word" that uses if block to count unique word and in the else block it update its value. In the next step, s variable is declared, that the user input method to store the value and another variable "w" is defined that split and sort the string value. In the last step, two for loop is declared in which the first loop passes the string value and calls the method "unique_word", and in the second loop if block is defined that check unique value and prints its value.

reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called CheckIn() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.

Answers

43 if you forgot the 43

Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash ('-') or a underscore '_'. For example, the string "-Yes" would return True but the string "Nope" would return False. Note: Your function will be unit tested against multiple strings. It is not enough to get the right output for your own test cases, you will need to be able to handle any kind of non-empty string. Note: You are not allowed to use an if statement.

Answers

Answer:

The program written in python is as follows:

def begins_with_line(userinut):

     while userinut[0] == '-' or userinut[0] == '_':

           print(bool(True))

           break;

     else:

           print(bool(not True))

userinput = input("Enter a string: ")

begins_with_line(userinput)

Explanation:

The program makes use of no comments; However, the line by line explanation is as follows

This line defines the function begins_with_line with parameter userinut

def begins_with_line(userinut):

The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)

     while userinut[0] == '-' or userinut[0] == '_':

           print(bool(True))  ->The function returns True

           break;

However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)

     else:

           print(bool(not True))  -> This returns false

The main starts here

The first line prompts user for input

userinput = input("Enter a string: ")

The next line calls the defined function

begins_with_line(userinput)

NB: The program does not make use of if statement

What happens if you attempt an operation that uses the input stream and the operation fails but the stream is OK

Answers

Answer:

The fail bit of the stream object will be set.

Explanation:

The Input Stream is been used to effectively and efficiently read data from a source .

Therefore in a situation in which an individual or a person attempt an operation that uses the input stream and the operation fails but the stream is OK this means that the fail bit of the stream object will be set . FAILBIT is generally set in a situation where the error that occured involves the loss of integrity of the stream in which it is more likely to persist even if various operation is been carried out or attempted on the stream which is why FAIL BIT can always be checked independently by calling the member function bad.

Lastly FAILBIT is as well set because of a read or write operation that fails.

Observe the things at Home in which you are using binary
conditions (ON/OFF) and Draw these things (any five).​

Answers

Explanation:

All five things i can come up with her

1. Doors (we either open or close them)

2. Tap (we either open or close the valve)

3.  Electric stove/cooker

4. The lid of containers

5. Shoes/ foot wears(we put them ON or OFF)

An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________ part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative _____________ with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in _____________ studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the __________ endorsement.

Answers

Answer:

1. Student.

2. Integral.

3. Agreements.

4. Graduate program.

5. DSO.

Explanation:

An F-1 student may be authorized by the DSO to participate in a curricular practical training program that is an integral part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative agreement with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in graduate program studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the DSO endorsement.

Please note, DSO is an acronym for Designated School Official and they are employed to officially represent colleges or universities in the United States of America. They are saddled with the responsibility of dealing with F-1 matters (a visa category for foreign students seeking admission into schools such as universities or colleges in the United States of America).

Other Questions
Do the table and the equation represent the same function ? Y=390+11(x) Water vapor at 10bar, 360C enters a turbine operatingat steady state with a volumetric flow rate of 0.8m3/s and expandsadiabatically to an exit state of 1 bar, 160C. Kinetic and potentialenergy effects are negligible. Determine for the turbine (a) the powerdeveloped, in kW, (b) the rate of entropy production, in kW/K, and (c)the isentropic turbine efficiency A factory packed 9600kg of flour in to small bags and large bags. Each small bag contained 3kg of flour and each large bag contained 5kg of flour. 2040 small bags were packed. How many large bags of flour were packed? Which of the following situations represent linear growth? Check all of the boxes that apply What is the value of Blaine says that the product of a positive integer and a negative integer is always less than either factor. Is he correct? Provide examples or counterexamples to support your answer.help me pleasseeeeeee It would be really helpful if you could solve this for me. Please and thank you:) What is a rate law?A. An equation that relates the rate of a reaction to the equilibriumpositionB. An equation that relates the reaction rate to the concentrations ofthe reactantsC. An equation that relates the rate constant to the temperature of areactionD. An equation that relates the concentrations of reactants to therate constant An entrepreneur is looking to open a restaurant in a town with only one other restaurant. The incumbent restaurant is very successful with high profits. Which of the following business strategies are most likely to allow the entrepreneur to start a profitable restaurant? Select all that apply. Offer the most popular dish served by the incumbent restaurant. Open the restaurant location near the incumbent restaurant. Use new technology and business practices to cut variable costs lower than the incumbent restaurant. Specialize in a type of cuisine not served by other restaurants in the region. Growing two species ofParamecium in the same testtube is an example of?A. Intraspecific competitionB. The founder effectC. Interspecific competitionD. A population bottleneck MSolve the following equation using the quadratic formula.x^2 - 8x + 97 = 0.x = 8 + 18i and x = 8 18iB.x= 8 + 18i and x = 8 - 18iC.x= 4 + 9i and x = 4 - 9iD. x= 4 + 9i and x= -4 - 9i I really need HELP PLEASE What would Ariadna's response most likely be? Me gustan las manzanas, naranjas y fresas. No me gusta montar a caballo. Me gusta sacar fotos y usar la computadora. Me gusta el verano y la primavera. Which equation has water as a product in the chemical reaction? Two radio antennas A and B radiate in phase. Antenna B is 120 m to the right of antenna A. Consider point Q along the extension of the line connecting the antennas, a horizontal distance of 40 m to the right of antenna B. The frequency, and hence the wavelength, of the emitted waves can be varied. (a) What is the longest wavelength for which there will be destructive interference at point Q? (b) What is the longest wavelength for which there will be constructive interference at point Q? Graph the line with: a slope of 4/5 through the origin. Find both the vector equation and the parametric equations of the line through (0,0,0) that is perpendicular to both uequalsleft angle 2 comma 0 comma 2 right angle and wequalsleft angle negative 2 comma 1 comma 0 right angle where tequals0 corresponds to the given point. Find the G for the combustion of half a mole of glucose C6H12O6 in kJ Write the complete electron configuration for the titanium atom. which of the following in order from the least to the greatest?.321,.33,.4.598,.409,.554.289,.305,.301.701,.698,.811