1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
8

What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?

Computers and Technology
1 answer:
lina2011 [118]3 years ago
5 0

Answer:

Infrared

Explanation:

the connection which requires an unobstructed "line of sight" between transmitter and receiver is called Infrared connection.                                

Infrared is the device which is used in T. V remotes.            

Infrared is also used in computer in the device like cordless keyboard, mouses and infra touch screen.

You might be interested in
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
Hello Brainly Students!
Usimov [2.4K]

Answer:

i need help on my wuestion and nobody responds

Explanation:

6 0
3 years ago
Read 2 more answers
Your sister is starting 9th grade next year and is thinking about going to college. What step would you recommend she take first
lozanna [386]

think about what she wants to do with her life and what collage is best fit for that


5 0
3 years ago
Read 2 more answers
How can a user remove or delete a PivotTable? Select the PivotTable and click Clear All in the Actions group under the Options t
Damm [24]

Answer:

-Pick a cell anywhere in the PivotTable to show the PivotTable Tools on the ribbon.

-Click Analyze > Select, and then pick Entire PivotTable.

-Press Delete.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort
    13·1 answer
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • Compare the logical link control and the media access control. Which of the following is a correct statement?
    7·2 answers
  • Which of the following would be considered a primary source of information?
    6·1 answer
  • Please help me with this question. I don’t get it
    11·2 answers
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • Which heading function is the biggest?<br> 1. h1<br> 2. h2<br> 3. h3
    7·2 answers
  • An entity can be said to have __ when it can be wronged or has feelings of some sort
    10·1 answer
  • Help me guys plssssss​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!