1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
3 years ago
15

You need to provide connectivity between two buildings without running any cables. You decided to use two 802.11ac APs to provid

e wireless connectivity between the buildings. Which of the following is the BEST choice to support this need?
a. Use omnidirectional antennas on both APs.
b. Use wide channels.
c. Use the 2.4 GHz frequency band.
d. Use direction antennas on both APs.
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
7 0

Answer:

D

Explanation:

Use Directional antennas on both APs

You might be interested in
What do you understand by storage devices ? Name any two storage devices.​
MatroZZZ [7]

Answer:

Types of storage devices

Primary Storage: Random Access Memory (RAM) Random Access Memory, or RAM, is the primary storage of a computer. ...

Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...

Hard Disk Drives (HDD) ...

Solid-State Drives (SSD) ...

External HDDs and SSDs. ...

Flash memory devices. ...

Optical Storage Devices. ...

Floppy Disks.

6 0
4 years ago
Read 2 more answers
In what way do networks help to protect data
Aleksandr-060686 [28]

One way that computer networks help to protect data is by backing up the data.

Computer networks are normally formatted to automatically back up all of the data that is stored on them. This protects the data in case of any type of computer system failure.

5 0
4 years ago
What term identifies the physical interface between a computer and its peripherals?
antoniya [11.8K]
(B. Hardware), Hardware is physical components, Software are the programs in the computer.
3 0
3 years ago
The two types of one-time-password tokens are ______ and ______.
Nutka1998 [239]

Answer:

event based and time based

Explanation:

OTP tokens come in two types: event-based (HOTP) and time-based (TOTP). Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Time-based OTP tokens generate codes that are valid only for a certain amount of time (eg, 30 or 60 seconds), after which a new code must be generated

5 0
4 years ago
Read 2 more answers
A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer w
Leviafan [203]
Virus










-----------------------------------
5 0
3 years ago
Other questions:
  • Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable
    10·1 answer
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • Assume that LO and HI have already been assigned as constants with LO < HI, and x has been declared as DWORD in the data segm
    7·1 answer
  • Does anybody know if that apple watch is actually worth what it costs?
    9·2 answers
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • How does the use of the computer impact businesses
    13·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • Short note about micro miniaturzation​
    6·2 answers
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!