1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
4 years ago
12

Your company has recently been hired to install a smart security system for a large office building. The system will include sec

urity cameras, voice-controlled lights, smart locks, and smart thermostats. Some of the security cameras will be installed outdoors throughout the parking lot. Which wireless IoT protocol should your company use for the installation?1. Wi-Fi because it is always encrypted2. Zigbee because it is always encrypted3. Z-Wave because it is the fastest wireless standard4. Bluetooth because it is easiest to configure
Computers and Technology
1 answer:
amid [387]4 years ago
8 0

Answer:

Z-Wave

Explanation:

1. Wi-fi because it is always encrypted. This is good because Bandwidth is high—up to 2 MHz, however it only works if the signal is strong and device is close to the access point. Its average range is between 30 to 100 meters. This drawback only makes this technology not a good option.

2. ZigBee because it is always encrypted, ZigBee has lot of edge like largest number of device to connect 6500 theoretically, low power usage, faster and others compared to other which would have made it a better option to recommend to my company but it has interoperability issues

3. Z-Wave because it is the fastest wireless standard apart from this Z-wave has better interoperability, reliability, low frequent which does not interfere with Wi-Fi network, maintain backwards compatibility across all versions which is good for maintenance, Z Wave network to have greater ranges and ability to “bend” around obstacles.

4. Bluetooth because it is easiest to configure Low Energy (LE) is better at conserving power, it has a much longer range compared to others —up to 300 feet, under ideal circumstances—its low transmission rate will keep it from being used for data-heavy applications such as video.

In view of security and distance and compared with other IoT protocol i would recommended Z-Wave

You might be interested in
Assume the following variable definition appears in a program:
AnnZ [28]

Answer:

cout << setprecision(2)<< fixed << number;

Explanation:

The above statement returns 12.35 as output

Though, the statement can be split to multiple statements; but the question requires the use of a cout statement.

The statement starts by setting precision to 2 using setprecision(2)

This is immediately followed by the fixed manipulator;

The essence of the fixed manipulator is to ensure that the number returns 2 digits after the decimal point;

Using only setprecision(2) in the cout statement will on return the 2 digits (12) before the decimal point.

The fixed manipulator is then followed by the variable to be printed.

See code snippet below

<em>#include <iostream>  </em>

<em>#include <iomanip> </em>

<em>using namespace std;  </em>

<em>int main()  </em>

<em>{  </em>

<em> // Initializing the double value</em>

<em> double number = 12.3456;  </em>

<em> //Print  result</em>

<em> cout << setprecision(2)<< fixed << number;  </em>

<em> return 0;  </em>

<em>}  </em>

<em />

4 0
3 years ago
.Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular
nata0808 [166]
What is the language you want for the code?
3 0
3 years ago
Many Java programs that you create will receive and process user input. In order to ensure that user input is accurate, you will
Furkat [3]

Answer: True

Explanation: True

4 0
3 years ago
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:
vodka [1.7K]
The answer is Cybercrime.  <span>The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  </span><span>Common types of </span>cybercrime<span> involve hacking, online scams and fraud, identity theft, etc.</span>
7 0
4 years ago
What is (12.2a + 9.7b) – (18.1b – 0.2a) – (6.7a + 6.8b), simplified?
Inga [223]
The answer should be 5.7a - 15.2b
8 0
3 years ago
Other questions:
  • What is cryptocurrency ? I need to do a research one it please help!
    6·1 answer
  • Given non-negative integers x and n, x taken to the nth power can be defined as: x to the 0th power is 1 x to the nth power can
    7·1 answer
  • The most significant factor in choosing a transmission method is its ____.
    10·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
    9·1 answer
  • What is a google search query that will search for xml files on the domain example.Com
    8·1 answer
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • Any correct answers will be helpful.
    13·1 answer
  • Make a list of any four computer that were used in the history of computer.​
    6·1 answer
  • A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!