answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
2 years ago
5

Which of the following is ideal for long distance communication ?

Computers and Technology
1 answer:
Vinvika [58]2 years ago
3 0
Microwave transmission is ideal for long distance communication. It is so good that it is used for satellite and space probe communication.
You might be interested in
Henry is creating a firewall rule that will allow inbound mail to the organization. what tcp port must he allow through the fire
charle [14.2K]
He needs to use a password from henry to get pass the firewall
3 0
2 years ago
Read 2 more answers
An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control s
sergeinik [125]

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.

5 0
2 years ago
1A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The
Sedaia [141]

Answer:

EMI (Electromagnetic Interference).

RFI (Radio Frequency Interference).

Explanation:

The new ethernet cable is installed near the ceiling and it is close to fluorescent lights and electrical equipment.Since the ethernet cable is carrying corrupt and distorted data so it needs protection.The protection  should be from EMI(Electromagnetic Interference) and RFI(Radio Frequency Interference).

8 0
2 years ago
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distribute
AnnyKZ [126]

Answer: parallel processing

Explanation:

Parallel processing is the process by which the processor has the capacity to execute parallel instruction at the same time. This is possible only by assigning the different task to the different cores present in the cpu. So a cpu with multiple cores are able to process multiple task as the same time parallel.

8 0
2 years ago
In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second frame
DerKrebs [107]

Answer:

There could be a collision if a hidden node problem occurs.

Explanation:

CSMA/CA(carrier sense multiple access/ collision avoidance) is a multiple access method in wireless networking, that allows multiple node to transmit. Collision avoidance of this method is based on preventing signal loss or downtime as a result of collision of transmitting multi signals.

If a node at step 4(transmit frame) sends the first frame, the node still needs to send a RTS(request to send) and to receive a Clear to send (CTS) from the WAP, the is to mitigate the issue of hidden node problem as all frame are treated as unit, so other listening nodes, not detected would seek to connect and transmit as well.

5 0
2 years ago
Other questions:
  • Name an analog quantity other than temperature and sound.
    14·1 answer
  • Using evidence to dispel myths or false beliefs is one way to move closer to evidence-based practice. Please select the best ans
    13·2 answers
  • The most direct way for Jonathan to gain on-the-job experience and earn money while attending school is to apply for:
    5·2 answers
  • Interactive sites where users write about personal topics and comment to a threaded discussion are called 
    15·1 answer
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
    10·1 answer
  • Use Excel to develop a regression model for the Consumer Food Database (using the "Excel Databases.xls" file on Blackboard) to p
    13·1 answer
  • E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
    13·1 answer
  • Write a program that simulates the functionality of a vending machine having the following characteristics:• The vending machine
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!