1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
12

Your company has recently been hired to install a smart security system for a large office building. The system will include sec

urity cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?1. Wi-Fi because it is always encrypted2. Zigbee because it is always encrypted3. Z-Wave because it is the fastest wireless standard4. Bluetooth because it is easiest to configure
Computers and Technology
1 answer:
amid [387]3 years ago
8 0

Answer:

Z-Wave

Explanation:

1. Wi-fi because it is always encrypted. This is good because Bandwidth is high—up to 2 MHz, however it only works if the signal is strong and device is close to the access point. Its average range is between 30 to 100 meters. This drawback only makes this technology not a good option.

2. ZigBee because it is always encrypted, ZigBee has lot of edge like largest number of device to connect 6500 theoretically, low power usage, faster and others compared to other which would have made it a better option to recommend to my company but it has interoperability issues

3. Z-Wave because it is the fastest wireless standard apart from this Z-wave has better interoperability, reliability, low frequent which does not interfere with Wi-Fi network, maintain backwards compatibility across all versions which is good for maintenance, Z Wave network to have greater ranges and ability to “bend” around obstacles.

4. Bluetooth because it is easiest to configure Low Energy (LE) is better at conserving power, it has a much longer range compared to others —up to 300 feet, under ideal circumstances—its low transmission rate will keep it from being used for data-heavy applications such as video.

In view of security and distance and compared with other IoT protocol i would recommended Z-Wave

You might be interested in
A palindrome number is a number that remains the same when its digits are reversed. Like 16461, for example, is a palindrome num
xxMikexx [17]

Answer:

Code is given below and output is attached as an image.

Explanation:

#include <iostream>

#include <fstream>

using namespace std;

bool isPalindrome(int n)

{

       // Find reverse of n

       int rev = 0;

       for (int i = n; i > 0; i /= 10)

               rev = rev * 10 + i % 10;

       // If n and rev are same,then n is a palindrome

       return (n == rev);

}

int main()

{

       int min = 1;        // Lower Bound

       int max = 200;      // Upper Bound

       ofstream myfile;

       myfile.open("palindrome.txt");

       for (int i = min + 1; i < max; i++)

               if (isPalindrome(i))

                       myfile << i << endl;

       myfile.close();

       return 0;

}

5 0
3 years ago
A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
o-na [289]

Answer:

Identity Theft. i hope this helps :D

5 0
2 years ago
Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the use
serious [3.7K]

Answer:

C

Explanation:

what types of loop will be used.

4 0
2 years ago
Small programs called _______ are used to communicate with Paris Friel devices such as monitors printers portable storage device
algol13

the answer is D drivers

7 0
2 years ago
Did the Z3 computer invented by Konrad Zuse have a negative effect on society?
musickatia [10]

Answer:

Explanation:

Không

4 0
2 years ago
Read 2 more answers
Other questions:
  • A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Whi
    15·1 answer
  • What are the features of a strong résumé? Check all that apply.
    7·1 answer
  • The use of themes in WordPress is a good illustration of what major concept?
    6·1 answer
  • A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
    5·1 answer
  • Salvado has a flash dish of is GB
    6·1 answer
  • Complete the sentence with the correct response.
    9·1 answer
  • Software piracy is acceptable as it helps us obtain software cheaper or sometimes even for free.
    11·2 answers
  • Choose ALL guidelines listed below pertaining to fair use.
    12·2 answers
  • "write a program to play and score the paper-rock-scissor game. each of two users types in either p, r, or s. the program then a
    6·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!