Where is line-of-sight Internet common?
In space
Outdoors
Inside
In businesses

Answers

Answer 1

Answer:

In businesses

Explanation:

Line of Sight internet provides an over-the-air internet connection to buildings that have a clear line of sight to a dedicated mast. This means no underground cables, quicker installation times and lower latency. It is common in businesses.


Related Questions

_____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood.a. Powerb. Ethicsc. Potentiald. Legitimacy

Answers

Answer:

The answer is "Option a"

Explanation:

The power is a means of control, that classifying characteristics of secession over the physical environment and the persons, objects which exist on that environment, and other options were wrong that can be described as follows:

In option b, It is a part of the philosophy of education, that's why it is not correct.Option c, Potential is used in the education section, that's why it is wrong.Option d, It is used in a single source computer, that's why it is wrong.

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.?

Answers

Answer:

Hub

Explanation:

Hub is used to connect devices in a network. It is also called a dumb device because it broadcasts the signals or messages on any of its ports to all other ports. For example a message has to be sent to a computer. Lets name that computer H. Hub will send that message to all connected ports on the hub not just considering that specific port of computer H. So hub is an unintelligent device which is not able to distinguish between devices and sends a messages to every port irrespective of which the destination host is. Now when the destination computer H responds to that message this too goes to all other ports on hub.This has a negative effect on network's performance as it might result in collisions between data packets.The bandwidth of hub is shared by all the devices connected to it. When a source host is sending a large amount of data to destination, it will take all the bandwidth which leads to slow network performance and access in other connected computers .The network speed and performances reduces as more devices are added.
Final answer:

The device referred to is a Network Hub, which is used to connect multiple devices in a network. Its disadvantage is that it broadcasts all incoming data to all connected devices, potentially causing unnecessary network traffic and impacting performance.

Explanation:

The device being described in the question is likely a Network Hub. Hubs are networking devices that connect multiple devices in a LAN (Local Area Network). The main disadvantage of a Hub is that it broadcasts the data it receives to all connected devices. This can negatively affect network performance because data might unnecessarily reach devices not intended to get the data, which can create network traffic. For example, if Computer A sends data to Computer B, the hub would broadcast this data to all connected devices, not just Computer B.

This disadvantage is not present in more sophisticated devices like Switches or Routers, as these devices intelligently direct the traffic to the intended recipient only, instead of broadcasting it to all devices.

Learn more about Network Hub here:

https://brainly.com/question/31860753

#SPJ3

For a DBMS to be efficient and more functional, data redundancy needs to be eliminated. This can be accomplished by creating smaller tables, with stable data structures, using what process?
a.) Data administration
b.) Data dictionary
c.) Data normalization
d.) Data retrieval

Answers

Answer:

c.) Data normalization

Explanation:

Data normalization is the a process to organize tables in the database in such a way that data redundancy and anomalies (as a result of data manipulation) can be eliminated. So data normalization arranges the data in the form of tables, remove redundant data from the tables and eliminates duplicated data and also makes a large table into smaller tables. These small tables can then be associated to each other by making relationships between them. Data normalization also reduces the problems created by the data modification. These are often referred to as data anomalies e.g. insertion , deletion and update anomalies. Lets say a large table has redundant or repeated data. Without normalization the redundant data will take more space in the memory. Also it will not be easy to update data in such a table as it might result in data loss.3 basic types of database normalization forms are First normal form (1NF), Second normal form (2NF) and Third normal form (3NF). Others include Boyce-Codd Normal Form (BCNF) , Fourth Normal form etc.1NF states that columns of the tables which are also called attributes should have atomic values, 2NF form handles Partial Dependency and 3NF form handles Transitive Dependency.

In JavaScript, what is the term for a built-in method that does not belong to any particular object, such as the isNaN() method?

Answers

Answer:

Top-level function  is the correct answer.

Explanation:

Top-level function  is the method in the JavaScript that is not a part of any other objects. It is built-in method in JavaScript such as isNaN() function, eval() function, _dump() function, print() function and may other functions. These functions are the object of the global variable or object.

So, that's why the following answer is correct.

Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick and goes home. The manager asks Natalie to fill in at the front desk for the rest of the afternoon. Which trait does Natalie demonstrate by adjusting her schedule?

Answers

Answer:

flexibility

Explanation:

she is able to adjust to the task that is being asked of her

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed. True or false?

Answers

Answer:

The answer is False

Explanation:

Information Technology (IT) handles the proper transmission, storage, retrieval and manipulation of data using computers. It also includes the use of  computer software, hardware and other peripheral equipment.

Information Systems on the other hand  are organisational systems that are designed to retrieve, store, manipulate and share information. The following are core components of information systems:

TechnologyStructure (which include the various roles in the organisation)People andTask.

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) _______.
a) pseudocode
b) flowchart
c) algorithm
d) structure chart

Answers

Answer:

algorithm

Explanation:

If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to start your investigation?

Answers

Answer:

If we are investigating login issues then we have to start with 'security logs' in 'windows logs' portion of Event viewer.

Explanation:

Much information about login issues is contained in log files which are related to security because it is mostly security issue. Some it is also better to start with 'system logs' portion of windows logs portion of Event viewer when there may be system problems instead of security issues. But in most cases there is security issues so 'security logs' is better option overall

Final answer:

To investigate login issues on a Windows computer, start by checking the Security logs in the Event Viewer, as they record security-related events including login attempt details.

Explanation:

If you were investigating login issues on a Windows computer, a good place to start your investigation would be the Security logs in the Event Viewer. The Security logs, which are part of the Windows Logs category, record security-related events such as valid and invalid login attempts as well as events related to resource use like file operations and user management. By examining the details contained within these logs, you can identify patterns or anomalies that may indicate what is causing the login issues.

A technician looks at a motherboard and sees a 24-pin connector. What component would connect to the motherboard through the use of this 24-pin connector?

Answers

Power supply connects to the motherboard through the use of the 24 pin connector.

Explanation:

Power supply

is an electrical devicesource of it come from electrical gridability to convert different form of energy (solar, mechanical & chemical) to electrical energyConverts main AC voltage to low-voltage current3 types - linear voltage, switch, unregulatedIt is also called PSU unit (Power supply unit)have to protect from over current, high voltage, etcMandatory for laptop to charge and use later

"Power supply" would connect to the motherboard through the utilization of 24-pin connector. A complete explanation is below.

A device which thus provides electricity to something like a load, would be considered as Power Supply.All power supplies have always had an influencing input connections which thus accepts energies from a source for the production of a wide range of electronic phenomena, and one or more peak power connectors that send current to such loads.

Thus the above response is right.

Learn more:

https://brainly.com/question/3158552

Which type of memory contains the instructions necessary for the computer's basic input/output system (BIOS) which is used to load essential data when the computer is turned on?

Answers

Answer:

Memory that contain the basic I/O system is called ROM. which is read only memory and it contain the all the basic Input/output system which is used to load essential data when the computer is turned on.

I hope it will help you!

Consider the following two code segments: Segment 1: while (k > 0) { System.out.println(k); k--; } --------------- Segment 2: while (k > 0) { System.out.println(k); k--; } while (k > 0) { System.out.println(k); k--; } Assume that in both cases variable k has the same initial value. Under which of the following conditions will the two code segments produce identical output.

Answers

Answer:

Always same value

Explanation:

These both code segments will always generate identical values given that we provide same value of k to both segments.

You can see attached pictures.

For years 2010 to 2015, the computers produced and shipped in highest quantity were _____. (Note: All the choices represent a kind of computer).

1) desktop computers
2) laptop computers
3) tablets
4) smartphones

Answers

Answer: (4) Smartphones

Explanation:

According to the given question, the computer produced and also shipped at very large quantity that is smartphones.

As, smartphones is basically refers to the mobile computing device and it contain various types of hardware capabilities, Multimedia functions, internet and the operating system.

In the year 2010 to 2015, the production of the smartphones get increased as the smartphones are steadily developing worldwide because of its excellent feature and design of the model. It is also affordable and the market price of the smartphones are efficient.

 Therefore, Option (4) is correct answer.  

Answer:

Explanation:

According to the given question, the computer produced and also shipped at very large quantity that is smartphones.

As, smartphones is basically refers to the mobile computing device and it contain various types of hardware capabilities, Multimedia functions, internet and the operating system.

In the year 2010 to 2015, the production of the smartphones get increased as the smartphones are steadily developing worldwide because of its excellent feature and design of the model. It is also affordable and the market price of the smartphones are efficient.

Therefore, Option (4) is correct answer.  

When an object is created, the attributes associated with the object are called: A. instance fields B. instance methods C. fixed attributes D. class instances

Answers

Answer:

Option A is the correct answer for the above question

Explanation:

The object is used to take memory for the class member and functions because the class is the only structure which defines the types of the member for that class. The class object is used to reference a member of the class. The object of the class is known as an instance of the class and the one object variables value is different from the other objects variable value for the same class. So the object is used to holds the instance field because the object is used to initialize the value of the variable of the class. So the attributes associated with the class object can be called the instance field . The above question also asked the same and the answer is Instance field which is stated from the option A. Hence Option A is the correct answer while the other is not because--

Option B states about instance method which refers to the method of a class for which that object is created.Option C states about the fixed attributes which are not the correct answer.Option D states about class instances which refer to the object of the class.

Final answer:

In the context of programming, the attributes associated with an object are called instance fields. These variables differentiate different instances of a class.

Explanation:

When an object is created in the realm of programming, the attributes associated with the object are called instance fields. These are variables that are associated with an instance of a class. Another way to comprehend it is to visualize a class to be a blueprint. Each instance (or object) of that class can have different values for these fields. For example, if we have a class 'Car', potential instance fields might include color, make, model, etc. Each specific car (instance) would have specific values for these attributes.

Learn more about Instance Fields here:

https://brainly.com/question/31779226

#SPJ6

Which do web servers host?
Websites
Networks
Firewalls
Zones

Answers

Answer:

Websites

Explanation:

A web server host websites, individuals or corporate websites, this helps us to show our websites in the World Wide Web, there are several companies offers this service, even we can get a free host, but a corporate website or a social media needs a lot of host recourses, these hosts are expensive than other, we could pay a web host monthly or per year.

A single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information.

Answers

Answer:

"Computer Based Information system (CBIS)" is the correct answer for the above question.

Explanation:

CBIS means about that system that is used to produce the information or process the information and it is computer-based because CB stands for computer-based and IS stands for an information system.It means that a system that helps by the computer and it is used to process the information then it can be called CBIS.To process the information in a computer system there is a need for software, people, database, hardware and processor which is a set of CBIS.The above question also wants to ask about the system which is a set of software, people, database, hardware and processor then it is known as CBIS which is described above. Hence the answer is CBIS.

Final answer:

The question describes an Information System (IS), a key aspect in Computers and Technology. An IS is a set of hardware, software, data, people, and procedures that work together to produce quality information. These components are vital to organizations, businesses and institutions.

Explanation:

The question describes a Information System, a key concept in the field of Computers and Technology. An Information System (IS) is a combination of hardware, software, data, network resources, and people that collects, transforms and disseminates information in an organization. It can include a simple setup like a desktop computer hardware and spreadsheet software, to a complex system spanning entire corporations.

Components of Information SystemHardware: This includes devices like computers, servers, networking equipment.Software: These are the programs used to handle the data. This includes enterprise resource planning (ERP) systems, databases, and office suites.Data: Data are raw facts or observations, typically about physical phenomena or business transactions.Network: This can range from internal networks to cloud-based services.Procedures: These involve the strategies, policies, methods and rules for using an information system.People: Every system needs people if it is to be useful. Often the most over-looked element of the system are the people.

Learn more about Information System here:

https://brainly.com/question/36400653

#SPJ3

What Windows Server 2016 feature leverages the storage contained on a network of servers and adds a new level of fault tolerance to server storage because fault tolerant volumes can now be spread among multiple servers?

Answers

Answer:

Storage spaces direct.

Explanation:

The windows operating system is system software used to manage all the activities running in the computer. The OS comes with an API that connects the system to a remote dedicated server known as the windows server. These server is updated annual, when the OP is up to date.

The windows server provides a limited storage platform and comes with a unique feature called the storage spaces direct. This feature allows access to multiple storage server to enhance fault tolerance.

Suppose you want to click up- and down-arrows on a "control" to change the value of the product price in cell C7. What form control (two word answer) would you use?

Answers

Answer:

Spin button.

Explanation:

Spread sheet applications are softwares used to analyze and manipulate data for clean and easy data presentation.

It is composed of columns or fields and rows or records to make a worksheet of a workbook in the application. Each box on the worksheet is called a cell.

Data can be inputted directly to a cell or with functions and formulas and with the form control feature.

Form control is use to specify the range of input to use in cells for easy data input. The spin button of the form control is used to input data by pressing the up and down arrow key on the keyboard.

When formulating a linear programming problem on a spreadsheet, objective cells will show the levels of activities for the decisions being made. A)True B) False

Answers

Answer:

B. False

Explanation:

Linear programming is a mathematical technique that optimises the linear constraints and objectives functions, which is the quantity whose value needs to be maximized or minimised, using the value stored in a variable.

The spreadsheet application is used to run the linear program on a particular cell, in apps background and automatically, once the enter key is pressed.

Other Questions
What is a common approach used in the discipline of systems analysis and design to understand the ways systems operate and to chart process flows and interdependency studies? Select one: a. database diagramming b. network diagramming c. application diagramming d. systems diagramming By giving tests in two different but equivalent forms, one can determine ________reliabilityvaliditypredictivecontent validity Which address does a host have to find out in order to send a data packet to another host (whose IP address they know!) If the person is on the same network? When the person is on a different network? What is the decimal representation of the following signed binary numbers?100000001100110010110111 In a different plan forarea codes the first digit is 1 through 6 the second digit is either 5 6 7 or 8 the third digit could be any number except 5 with this plan how many ways is area code possible Dr. Ezekiel found a correlation of 0.73 between scores on a measure of physical exercise and pounds lost in a diet program in a sample of men over 40. This correlation coefficient indicates that: Why do simple animals, such as flatworms and sea stars, survive without special circulatory systems but more complex organisms, like reptiles and humans, cannot? Which of the following managers is demonstrating the management function of planning rather than organizing, controlling, or leading?a. Sue told her employees the department needed 12% more sales this year than last and they would be contacting at least four new customers each weekb. Martin assigned six people to work on the advertising campaign and four to work on the customer databasec. Kyle reviewed the sales figures after six months and replaced three of the salespeople who were underperformingd. Valerie awarded a $50 bonus to employees who brought in a new customer Given the below sequence:-1, -3, -5, -7, . . .(a) What are the next 3 terms(b) Is this an arithmetic or geometric sequence?(c) Why?(d) How would you find the 27th term? Find the 27th term. (show your work) determine whether each pair of functions are inverse functions. 1) f(x)=10x+9/8, g(x)=25x-9/10 2) f(x)=x-9, g(x)=x+9 a. both 1 and 2 are inverse functions. b. only 2 is an inverse function c. brother 1 nor 2 is an inverse function. d. only 1 is an inverse function Prefiere nadar en_____ _ porque no le gustan las olas. How does the inset map at the top of the page help explain why Hitler was expecting the invasion to cross from Dover to Calais over the Strait of Dover? Solve the system. 23x - 12y = 1 - 43x +y =-3 how can u use volume and surface area to solve real world problems -4/5x - 20/7x = 663/56 - 1/2x A point charge q1 = 1.0 C is at the origin and a point charge q2 = 6.0 C is on the x axis at x = 1 m.(a) Find the electric force on charge q2.F12 = ? mN(b) Find the electric force on q1.F21 = ? mN(c) What would your answers for Parts (a) and (b) differ if q2 were -6.0 C? Consider the market for cars. Which determinant of demand is affected by each of the following events? Choose from: consumer preferences, prices of related goods, incomes, expectations, and the number of buyers. a. Environmentalists launch a successful One Family, One Car campaign.b. A baby boom occurred 16 years ago.c. Layoffs increase as the economy sheds millions of jobs.d. An oil shortage causes the price of gasoline to soar.e. The government offers tax rebates in return for the purchase of commuter rail tickets.f. The government announces a massive plan to bail out the auto industry and subsidize production costs. 7y+3=4y18y = ___(type your answer as a number) The chart below shows one store's sales of computers, listed by model.MayJuneQuilrenQuilrenDinztopu Quilren 2JuvantoDinztopQuilren 2JuvantoIf the changes in sales between May and June continue at the same rate, what will be the percent change in total computersales from June to July? (Round your answer to the nearest tenth.)17.1%20.7%34.0%43.2% A PICC line is a short catheter inserted into the jugular vein. A PICC line is a catheter that allows for infusion of intravenous fluids without an infusion pump. A PICC line is a long catheter inserted through the veins of the antecubital fossa. A PICC line is a catheter that is used for emergent or trauma situations. Steam Workshop Downloader