1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
8

What type of wireless connection requires an unobstructed "line of sight" between transmitter and receiver?

Computers and Technology
1 answer:
lina2011 [118]3 years ago
5 0

Answer:

Infrared

Explanation:

the connection which requires an unobstructed "line of sight" between transmitter and receiver is called Infrared connection.                                

Infrared is the device which is used in T. V remotes.            

Infrared is also used in computer in the device like cordless keyboard, mouses and infra touch screen.

You might be interested in
Which tool could be used to display only rows containing presidents who served two terms?
kherson [118]

Answer: The tool that could be used to display only the rows containing the presidents who served two terms is the<u> Filter.</u>

Explanation:

If you are using Excel the filter tool is a great way to find the relevant information you are searching for. This will remove all other data from the search results, in this case presidents that only served one term.

The filtering of rows can be used three ways;

  • By the value
  • By the criteria
  • By the format

By using the filter, you can find any phrase, number, dates, etc. Multiple columns can be filtered at the same time. Also, blank cells can be filtered out.

5 0
3 years ago
Read 2 more answers
When you are ready to print your document, what tab and command should you choose from the menu?
Margaret [11]

Answer:

File, Print UWU

Explanation:

3 0
3 years ago
Read 2 more answers
How does a Cloud-first strategy differ from other approaches to Cloud?
Brut [27]

Answer:

There is a considerable difference between a cloud-first strategy and other cloud approaches. The developers of the cloud-first strategy are familiar of every data point that requires backup and synchronization. As a result, a lower assembly layout that is more tolerant of database sync is required. In other words, a cloud-first strategy can easily accommodate new technology.

Cloud-first strategy is the current data management method that was not available a few years ago. Such processes and reliability are inapplicable when transferring application software and data to the cloud. You will have to make sacrifices in terms of load balancing and distributed functionality, which will be limited when using other cloud approaches. And this is where Cloud-first strategy shines, as you will be able to control and use all of the host's functionalities.

Explanation:

A cloud-first strategy is one in which all or most of an organization's structure is moved to a cloud-computing environment. Traditionally, organizations required physical supplies to keep their online data; nowadays, they store it on the cloud, which is fundamentally more useful. Cloud-first organizations, regardless of size or importance, are designed to operate their operations on cloud servers. Rather of transferring the organization's data and services to the cloud, adopt a cloud-first strategy and design the application software from the ground up. Not only does the cloud-first strategy outperform traditional application architectures in terms of performance, but it also provides higher stability.

5 0
2 years ago
To make the most informed purchasing decision, you should:
musickatia [10]

Answer:

its either A or B but im leaning more towards B

Explanation:

6 0
2 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
4 years ago
Other questions:
  • Write a program that prompts the user to enter a string (may contain spaces) and displays its last character. Enter s string: Pr
    13·1 answer
  • Match the challenge with the term or process that offers a solution.
    6·1 answer
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
    7·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • I wrote a program to calculate how many unique students I have taught over the years. It will read in a file formatted with firs
    5·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • What approach do you prefer to take when creating presentations for class projects? Would you rather use software or create pres
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!