1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
13

Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common

use scenarios.
Computers and Technology
1 answer:
My name is Ann [436]3 years ago
5 0

TCP/IP networking designer is the one Layer 2 or wireless WAN technology presented in Lesson 3.

<h3>What are the pros and cons of TCP/IP networking?</h3>

It's interoperable, which means it lets diverse networks communicate across platforms. It's a set of open protocols. Because it is not held by any one institution, it can be used by anybody or any group. It's a client-server architecture that's scalable.

Thus, it is TCP/IP networking

For more details about pros and cons of TCP/IP networking, click here:

brainly.com/question/13486460

#SPJ1

You might be interested in
What refers to a metal combined with one or more other elements
alexira [117]
The correct answer is an Alloy.
8 0
3 years ago
Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
Varvara68 [4.7K]

Answer:

Explanation:

Farmers are always both directly and indirectly connected to each other

Their network is mostly strong

Networks become weak only on the edges (ends) of the river but doesn't completely dimnish

With the available network length, the center of river bank forms the strongest network of all and becomes a key player in defining the balance property of overall network

The network is very well structurally balanced and we can see that through the below image

20 miles 10 20 30 40 50

See attachment file for diagram

Considering the total length of river as 50miles and and the center of the whole length will be at 25th mile. From that point, if we consider a farmer will be be having friends for a length of 20miles both along upstream and downstream.

By this he'll be in friend with people who are around 80% of the total population. As me move from this point the integrity increases and this results in a highly balanced structural network.

6 0
3 years ago
PLEASE HELP!!! ILL MARK BRAINLIEST!!
xz_007 [3.2K]

Answer:

1. Copyright.

2. Trademark.

3. Patent.

Explanation:

A patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of the following;

1. Copyright: protects the specific expression of a creation.

2. Trademark: protects signs, symbols, names, or short phrases that reveal the origin of a product or service.

3. Patent: protects the idea underlying a creation.

7 0
3 years ago
How can I make a website login system with only using php?​
Alona [7]

Answer:

<h3><u><em>PHP-enabled web pages are treated just like regular HTML pages and you can create and edit them the same way you normally create regular HTML pages.</em></u></h3>

<u>(I hope this helps!)</u>

4 0
4 years ago
what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
AlekseyPX

You can use a plagiarism checker.

8 0
3 years ago
Other questions:
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • Do anti viruses install themselves on other computers in the network
    6·1 answer
  • How does an ip address allow your computer to be reached
    7·1 answer
  • Identify a data type applied in an input element to create slider controls.
    13·1 answer
  • What are three responsibilities of an operating system? please answer quick!!!
    9·1 answer
  • Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
    9·1 answer
  • A _____________ is designed for a individual user.
    9·1 answer
  • Does anyone have any advice for me im a junior in highschool
    10·2 answers
  • What is uncopyrighted software that is given away without cost
    13·1 answer
  • Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!