1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
1 year ago
3

Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. Which of the following

, if performed, would still not allow him to deploy these new cameras to the selected location?
a. Use a power injector on the ethernet cabling running to the cameras. b. Have an electrician run power to the selected location. c. Use a switch that includes POE or POE+ capabilities. d. Replace the unmanaged switch with a managed switch.
Computers and Technology
2 answers:
Anton [14]1 year ago
7 0

It is to be noted that because Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. The option which if performed, would still not allow him to deploy these new cameras to the selected location is to have an electrician run power to the selected location.  (Option B).

<h3>What is a Network-Based Camera?</h3>

An IP camera, often known as an Internet protocol camera, is a form of digital security camera that collects and transmits video footage via an IP network. They are frequently used in surveillance. In contrast to analog closed-circuit television cameras (CCTV), IP cameras simply require a local network.

An analog camera is a type of classic camera that is used in CCTV systems. It feeds video to VCRs or DVRs via cable. IP cameras are any digital cameras that can send signals over a network wire to be saved. Many security camera systems on the market today are hybrid systems that combine analog and digital elements.

Learn more about Network Based Cameras:
brainly.com/question/17031699
#SPJ1

andreev551 [17]1 year ago
7 0

Answer:d. Have an electrician run power to the selected location

You might be interested in
The person in charge of recording the sound should always
lubasha [3.4K]
I’d say wear headphones but I agree with the previous answer which said most of them could be necessary
8 0
4 years ago
A relative path name defines a path from_________________________ Select one: a. from the UFD (user file directory) b. the curre
lorasvet [3.4K]

Answer:

(b)  the current directory

Explanation:

A path is the location or route to a particular file or folder in an operating system. This path is always unique and can either be relative or absolute.

A relative path name of a file defines the path to the file from the current or present working directory.

An absolute path name of a file defines the path to the file from the root directory. This path gives a complete descriptive path to a file from the start of the actual file system of the operating system.

4 0
3 years ago
Multiple Choice
earnstyle [38]
1 )  B ) I<span>ntersections.
2 ) A ) Freeways ( i believe )
Matchmaking
-</span><span>Retractable STOP sign arm ( school bus ) 
-Jaywalking ( d</span><span>angerous pedestrian practice ) 
- Moped ( </span><span>cross between bicycle and motorcyble ) 
1 ) I would say the </span><span>major cause of collisions between cars and motorcycles is due to motorcycles driving into lane/places cars can not get into. - lane splitting, traffic jam - 
2 )When there is a yeild sign or a crossing sign, it's </span><span>legal for a pedestrian to cross a roadway. ( I believe )
3)</span><span> Motorists must keep a constant lookout for pedestrians crossing and at intersections. 
4) I know when trucks are driving up or anything similar they get faster and sometimes cant control, so there are certian stops that trucks go up to make them slow down. I honeslty don't know if you should go around or not. But i hope this helps.
</span>
7 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Why did i get blocked
sergejj [24]
Because you asked something innnapropiate
7 0
4 years ago
Read 2 more answers
Other questions:
  • What type of traffic always goes to all devices in a subnet?
    10·1 answer
  • What should you keep in mind when typing a message on the Internet?use as many A.acronyms as it saves space
    7·1 answer
  • Most internet connections use what transmission
    13·2 answers
  • What is the name of the file manager in Microsoft Windows? The file manager used in Microsoft Windows is
    14·2 answers
  • Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
    12·1 answer
  • __________ has the highest conviction rate of any vehicle-related offense.
    11·1 answer
  • Select the different network functions from the list below.
    10·1 answer
  • Can someone help me with my homework?
    7·1 answer
  • Convert the expression ((a+b) + c * (d+e) + f) * (g+h) to a:
    13·1 answer
  • What extra dimension do 3D objects have that 2D objects do not have?<br><br> help
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!