1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
2 years ago
13

Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common

use scenarios.
Computers and Technology
1 answer:
My name is Ann [436]2 years ago
5 0

TCP/IP networking designer is the one Layer 2 or wireless WAN technology presented in Lesson 3.

<h3>What are the pros and cons of TCP/IP networking?</h3>

It's interoperable, which means it lets diverse networks communicate across platforms. It's a set of open protocols. Because it is not held by any one institution, it can be used by anybody or any group. It's a client-server architecture that's scalable.

Thus, it is TCP/IP networking

For more details about pros and cons of TCP/IP networking, click here:

brainly.com/question/13486460

#SPJ1

You might be interested in
The background image does not affect any cell’s format or content. _______
Korvikt [17]
Hmmm...that is true 
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
3 0
2 years ago
Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnotice
Romashka [77]

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

  • APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.
  • Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

6 0
3 years ago
Under which menu option of a word processing program does a callout appear?
yuradex [85]
The TAB is INSERT and the MENU is SHAPES. I hope that this is the answer that you were looking for and it has helped you.
6 0
2 years ago
Read 2 more answers
Explain the uses of computer in police department​
shusha [124]

Answer:

Not only can police officers store records and reports in online databases, but they can also use computers and hard drives to store thousands of images, reports and videos. Computers make mass storage possible, and enable giant online databases that can accurately ID suspects anywhere in the country.

5 0
3 years ago
Read 2 more answers
You are given two arrays of integers a and b of the same length, and an integer k . We will be iterating through array a from le
rodikova [14]

Answer:

#include <iostream>

using namespace std;

int main(){

   int arr1[5], arr2[5], k = 7;

   arr1 = {1,3,5,3,6}

   arr2 = {1,3,2,4,4}

   int reverseA2[5];

   for (int x = 5; x > 0; x++){

       reverseA2[5-x] = arr2[x-1];

   }

   for (int i = 0; i < 5; i++){

       if ( arr1[i] + reverseA2[i] < k){

           cout<< arr1[i] << " , "<<reverseA2[i];

       }

   }

}

Explanation:

The C++ source code prints a pair of values from the arr1 and reverse arr2 arrays whose sum is less than the value of the integer variable value k.

4 0
3 years ago
Other questions:
  • Which writing format is also beneficial to public speaking? a. Five paragraph essay c. Conventions b. Prose d. None of these
    5·2 answers
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • Nonverbal messages from the movie it​
    5·2 answers
  • Which website can help you find antivirus software ?
    10·1 answer
  • How do i do this?
    14·1 answer
  • A special type of loans for houses
    9·2 answers
  • Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
    11·1 answer
  • Impacto que ha tenido en la sociedad la educacion virtual​
    11·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!