1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
6

Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works

tations, instead of connecting them by Wi-Fi to his network. Specifically, he wants to know if that would speed up communications for the workstations. You examine his router and find that it’s using 802.11ac Wi-Fi. Would you advise him to upgrade to Ethernet? Why or why not?
Computers and Technology
1 answer:
Helen [10]3 years ago
5 0

Answer:

Yes

Explanation:

Depending on the ethernet standard used, the IEEE 802.3 is faster than the WIFI (IEEE 802.11ac).

The ethernet protocol on cabled networks are of different speed based on ethernet standard which ranges from 10 Mega-bits to 100 Giga-bits per second. This protocol is found in the physical layer of the OSI model.

The wifi 802.11ac also known as wifi 5 is a wireless connection medium in the physical layer of the OSI model. It has a range of aggregate speed capacity of  433 mega-bits per second to 6.77 giga-bits per second.

You might be interested in
In C++ please.
natali 33 [55]

Answer:

Following are the code to this question:

#include <iostream>//defining header file  

using namespace std;    

bool rightTriangle(int s1,int s2,int s3) //defining method rightTriangle  

{

int t1,t2,t3; //defining integer variables

t1 = s1*s1; // multiplying side value and store it into declaring integer  variables

t2 = s2*s2; // multiplying side value and store it into declaring integer variables

t3 = s3*s3;  // multiplying side value and store it into declaring integer variables

if(t3 == t1+t2)//use if block to check Pythagoras theorem

{

return true; //return true

}

else //else block

{

return false; //return false

}

}

bool equalNums(int n1,int n2,int n3,int n4) //defining method equalNums  

{

if(n1==n3 && n2==n4) //defining if block that checks  

{

return true;//return value true  

}

else //else block  

{

return false; //return value false

}

}

int main()//defining main method

{  

int t1=3,t2=4,t3=5,t11=3,t12=4,t13=5; //declaring integer varibles and assign value  

int check=0;   //defining integer varible check that checks values

if(rightTriangle(t1,t2,t3)&&rightTriangle(t11,t12,t13)) //defining codition to check value using and gate

{

if(equalNums(t1,t3,t11,t13) || equalNums(t2,t3,t12,t13)) // defining conditions to check value using or gate

check = 1; //if both conditions are true

}

if(check==1) //if block to check value is equal to 1

{

cout << "Right Congruent Triangles"; //print message

}

else//else block

{

   cout << "Not Right Congruent Triangles";//print message

}

}

Output:

Right Congruent Triangles

Explanation:

  • In the above-given code, a boolean method "rightTriangle" is declared, in which it accepts three integer variable "s1, s2, and s3" as a parameter, inside the method three another variable "t1, t2, and t3" is declared, in which parameter stores its square value.
  • In the next line, a conditional statement is declared that checks the "Pythagoras theorem" value and returns its value.  
  • In the next step, another method "equalNums" is declared, that accepts four integer parameter "n1, n2, n3, and n4", inside the method a conditional statement is used that uses an operator to check n1, n3, and n2, n4 value if it is true it will return true value else it will return false.
  • Inside the main method, integer variable and a check variable is defined that uses the if block to passes the value into the method and checks its return value is equal if all the value is true it will print the message "Right Congruent Triangles" else "Not Right Congruent Triangles".
7 0
3 years ago
Pls help me thx would really help me
Assoli18 [71]

Answer:

rooster don't lay eggs tho

4 0
3 years ago
Read 2 more answers
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
Explain why the cosmic horizon is much smaller than the universe itself
sashaice [31]
The cosmic horizon is what your eye allows you to see, and that is only a small fragment of the universes actual size
3 0
3 years ago
To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting
noname [10]
The answer is : it was easily manipulated.   To narrow the search for consumers, search engines used to measure the relevance of a website or an information page by counting the number of times the searched words appeared on that web page or document.  They don't use this criterion anymore because it was easily manipulated.
5 0
3 years ago
Other questions:
  • Is this picture the CPU, RAM, CD, or Operating System
    15·1 answer
  • Which country does coriander come from
    11·2 answers
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Will give brainliest!<br> Who created binary, and does anyone have any idea how?
    13·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
    6·1 answer
  • CLS
    12·1 answer
  • What are the common internal components to most electronic devices?
    10·1 answer
  • Evolution of management​
    6·2 answers
  • View the contents of the /root/.bash_profile file. type cat /root/.bash_profile at the prompt to answer the question. what is th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!