in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​

Answers

Answer 1

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.


Related Questions

list any four e-commerce website​

Answers

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

A
is the smallest of the network types and provides connectivity for one person’s devices.

Answers

Answer:

Personal Area Network (PAN)

Explanation:

A  Personal Area Network (PAN) is the smallest of the network types and provides connectivity for one person’s devices.

A personal area network refers to a computer network that is used for interconnecting various electronic devices that are centered on the workspace of an individual. A PAN enables data transmission among the following devices: 1. Computers

2. Smartphones

3. Tablets

4. Personal digital assistants.

ANSWER ASAP!!!!!

Which statement is true regarding achievers?
A.
Achievers bring about a reduction in socializers.
B.
Achievers interact with the environment.
C.
Achievers cause grief to other players.
D.
Achievers like to interact with other players.
E.
Achievers like to collect points and earn rewards.

Answers

Answer:

The correct answer will be:

E. Achievers like to collect points and earn rewards.

Explanation:

What is the most important function of a network operating system (NOS)?

Answers

Answer:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

Explanation:

One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

What is network operating system?

An operating system for computers known as a "network operating system" (NOS) is primarily made to handle workstations, personal computers, and occasionally older terminals that are linked together over a local area network (LAN).

A NOS's supporting software enables resource sharing and communication amongst various networked devices. A NOS's usual hardware configuration consists of several personal computers, a printer, a server, and file servers that are linked by a local network.

Because earlier iterations of the fundamental operating system weren't created with network use in mind, network operating systems

Therefore, One of the most important functions of a network operating system is its ability to share resources with other network users. The most common resource that's shared is the server's file system.

To learn more about network operating system, refer to the link:

https://brainly.com/question/28356173

#SPJ2

The most effective leaders treat everyone alike. True True False

Answers

Answer:

you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)

Explanation:

Answer:

True

Explanation:

Sorry this ain't bout HW but how do I get this off my screen it's pretty annoying

Answers

Have you tried the esc button? Or restart your cp

After inserting a video into your slide how can you test it

Answers

Explanation:

How to insert video into PowerPoint

Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.

Helppppp plzzzz it's computer science helpp plzzz

Answers

1. String

2. "is assigned to"

is a way og saving a file so it can be used by a different program​

Answers

Answer:

what are you even asking

Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.

Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.

Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.

Create your own unique examples for this assignment. Do not copy them from the textbook or any other source

Answers

I can answer the first question a bit:
Objects are nothing but instance of a class. To know two objects are identical are not, use the is operator.
Is operator: The is operator is used to compare the two objects that are identical or not. The is operator returns true, if the variables on either side of the operator point to same object. If the variables on either side of the operator point to different object then it can also return true.
Value: Value is also an object that assign to a variable. Comparing to objects through === operator.
The term equivalent means.... is used to when the two operators are equal or not , if equal condition returns true.

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

A computer game picks a random number between 1 and 100, and asks the player to guess what the number is. If the player makes a correct guess, the game congratulates them, and stops. If the player does not make a correct guess, the game tells the player that their guess is either too high, or too low. If the player guesses with an answer that is not a number between 1 and 100, an error message is displayed. The game continues to give the player chances to guess, until the player guesses correctly. You are going to plan an interactive program to implement this game. do this using scratch

Answers

Answer:

In Python:

import random

computerguess = random.randint(1,101)

userguess = int(input("Take a guess: "))

while not (userguess == computerguess):

   if userguess<1 or userguess>100:

       print("Error")

   elif not (userguess == computerguess):

       if userguess < computerguess:

           print("Too small")

       else:

           print("Too large")

   userguess = int(input("Take a guess: "))

print("Congratulations")

Explanation:

This imports the random module

import random

Here, a random number is generated

computerguess = random.randint(1,101)

This prompts the user for a guess

userguess = int(input("Take a guess: "))

The following loop is repeated until the user guess correctly

while not (userguess == computerguess):

If user guess is not between 1 and 100 (inclusive)

   if userguess<1 or userguess>100:

This prints error

       print("Error")

If the user guessed is not correct

   elif not (userguess == computerguess):

If the user guess is less

       if userguess < computerguess:

It prints too small

           print("Too small")

If otherwise

       else:

It prints too large

           print("Too large")

This prompts the user for a guess

   userguess = int(input("Take a guess: "))

The loop ends here

This prints congratulations when the user guess correctly

print("Congratulations")

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

a___ is a placeholder where you can enter text to manipulate and give new graphical effects.​

Answers

Answer:

A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects

Decrypt this message: P ht uva h zwf
It has been encrypted with a shift of 7 (remember each letter needs to go backwards.
uhhh pls help with this ill mark brainliest

Answers

translation: I am a spy

round 74,361 to the nearest 10​

Answers

Answer:

74,400 i think

Explanation:

what if the result of conectivity testing is 100%Loss?Explain.​

Answers

Answer:

If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server

libre office is what program​

Answers

I’m not 100% sure what this question is asking, but I believe the answer would be “an open-source office productivity software”.

Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.

Thinks someone could help me out with this? ​

Answers

Answer:

Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.

Explanation:

This is quite difficult. I appologize if I get this wrong.

(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)

what are the different types of document required for mail merge?

Answers

Answer:

More Information. A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions. There are three documents that are involved in the mail merge process: the main document, the data source, and the merged document.

Explanation:

Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False

Answers

Answer:

true

Explanation:

mark brainliest ☺☺☺☺☺☺

Charles was supposed to present his PowerPoint slides to his classmates in a classroom, but now he has to present in the auditorium in front of his entire grade. What change will Charles have to make when he presents his slides?

He will have to change his topic.
He will have to rearrange his slides.
He will have to speak more loudly and clearly.
He will have to tell his friends about the change.



HELP ASAP

Answers

Answer:

it is c

Explanation:

cus of the long and huge hall of u have in ur school

Answer: C

Explanation: Because he will need the whole grade to hear, or you know grab a mic :D HOPE YOU ENJOY YOUR DAY

Which software documentation guideline did the IEEE establish?
A.
Avoid spelling errors.
B.
A glossary should be present to define technical terms and acronyms.
C.
The font has to be in black.
D.
Documents should not have page numbers.

Answers

Answer:

B

Explanation:

I am big brain

Plzzzzz helppppp hurry plzzzzzzzz

Answers

The second one is A.

Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working! (please give an actual answer...)

*examples of required output at the bottom*

code: public class CircularList
{
private ListNode head;
private ListNode tail;
private int size;







public CircularList()

{

head = tail = null;

size = 0;

}





public int size()

{

return size;

}





public boolean isEmpty()

{

return (size == 0);

}





public int first()

{

if (head != null) {

return head.getValue();

}

return -1;

}




public Integer last()

{

if (tail != null) {

return tail.getValue();

}

return -1;

}



public void addFirst(Integer value)

{

head = new ListNode(value, head);

if (tail == null) {

tail = head;

}

size++;

}





public void addLast(Integer value)

{

ListNode newTail = new ListNode(value, null);

if (tail != null) {

tail.setNext(newTail);

tail = newTail;

} else {

head = tail = newTail;

}



size++;

}





public void addAtPos(int pos, Integer value)

{

if (pos == 0) {

addFirst(value);

return;

}

if (pos <= 0 || pos > size) {

return;

}

if (pos == size) {

addLast(value);

return;

}



ListNode ptr = head;

for(int i=0; i = size) {

return retVal;

}

if (pos == 0) {

return removeFirst();

}

ListNode ptr = head;

for(int i=0; i
ptr = ptr.getNext();

}

retVal = ptr.getNext().getValue();

if (pos == size-1) {

tail = ptr;

tail.setNext(null);

} else {

ptr.setNext(ptr.getNext().getNext());

}



size--;

return retVal;

}





public int findNode(Integer find)

{

ListNode ptr = head;

for(int pos=0; pos
if (ptr.getValue() == find) {

return pos;

}

ptr = ptr.getNext();

}

return -1;

}




public void rotate()

{

addLast(removeFirst());

}




public String toString()

{

String output = "";

ListNode iter = head;

while(iter != null) {

output += String.format("%d ", iter.getValue());

iter = iter.getNext();

}

return output;

}



}

size = 6 first = 50 last = 60
50 20 10 40 30 60

removeFirst = 50
size = 5 first = 20 last = 60
20 10 40 30 60

removed = 30
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 20 last = 60
20 10 40 60

found at -1
removed = -1
size = 4 first = 20 last = 60
20 10 40 60

size = 4 first = 10 last = 20
10 40 60 20

Answers

Answer:

code 345code 4537

Explanation:

Complete the sentence.
One way to increase the reliability of a hard disk drive is by making it part of ____
an optical array
a capacitator
a RAID
an analog ray

Answers

I think it is the capacitor

Answer: It is raid

Explanation:

Took the test for edge

Examples and meaning of external hardware.​

Answers

Answer:

External hardware devices include monitors, keyboards, mice, printers, and scanners. external hardware devices are usually called peripherals.

5 examples of hardware?

Mouse, Keyboard, Monitor, Printer, USB, CD Drive, RAM, Hard Drive, Joystick, Scanner, DVD, CPU, Motherboard, Etc.

Explanation:

Hope this help have a good rest of your  day

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?

Answers

Answer:

Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.

Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called

Answers

Answer:

I think its called "cloud computing"

Answer:

cloud computering

Explanation:

Other Questions
Can someone just explain to me how to find u Thanks! Tyler's family has 4 children. How many ways can they line up to get their flu shot at the doctor? Answer question 7. Estudiaste mucho?!!!!!!!!!!!!!!!!!!!!!! please help !!!!!!!!!!!!!!!!!!!!!I will give Brainliest for the best answer please urgent please beg help Multiple Choice Question Valpar Company produces several lines of laundry hampers. The factory is highly automated and uses an activity-based costing system to allocate overhead costs to its various products. During the upcoming period the company expects to produce 72,000 units. The costs and cost drivers associated with four activity cost pools are given below: Activities Unit Level Batch Level Product Level Facility Level Cost $20,000 $10,000 $15,000 $36,000 Cost Driver 4,000 labor hours 400 set-ups % of use 72,000 units Production of 20,000 units of its popular foldable hamper required 2,000 labor hours, 20 setups, and consumed one-quarter of the product sustaining activities. What amount of batch-level costs will be allocated to the product What effects do illegal drugs have on American society? This answer can be given in either complete sentences or as a bulleted list. What term is used by scientists to describe the gradual increase in surface temperature of the earth? Which table represents the statement "A computer repairman makes $25 per hour"? Which leader was a member of the Communist Party yet made the most changes against Communismwhen he took office?Leonid BrezhnevMikael GorbachevBoris YeltsinAlexander Putin A local bakery sells cupcakes for $3.50 each. The fixed monthly cost totals $275 which includes rent, utilities, and wages. Each cupcake costs the bakery 0.90 to make. Tina's college tuition is $7,500. She pays 25% down and takes out aloan for the balance. How much of a loan does Tina take out? Animal that live in water is also called as _____? Please help due today what does "the customer is always right" mean According to Greg, the perfect cherry pies have a ratio of 240 cherries to 3 pies. How many cherries does Greg need to make 9 perfect cherry pies? The nucleus of an atom stays together only because the repulsive forces, calledforces, are overcome byeven stronger attractive forces.fusionnuclearelectrostatic 24, 12, 10, 15, 10, 22, 12mean:median:mode:range:3) 14, 9, 20, 5, 17, 13mean:15median:mode:range:4) 21, 15, 16, 25, 13, 18mean:median:mode:range:5) 20, 17, 10, 31, 25, 18, 12mean:median:mode:range: Number of minutes Number of bacteria1 12 43 94 16how many bacteria will there be after 20 minutes? Explain your answer please Determine if the following two structures areidentical, isomers, or unrelated?ABidenticalisomersunrelated 5. What method can be use to prove the triangles below are congruent? (look at photo for answer options)