The answer is C, ROM often stores the basic instructions a computer needs when powering on, part if the BIOS.
#include
#include
using namespace std;
int main(){
int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );
for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;
return 0;
}
Answer:
C. Z-wave
Explanation:
The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.
The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.
The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.
<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.
<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.
<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.
The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.
Smart card key reader to be placed or installed where is required such as an opening door or entrance of office or organization extra.
Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.
By Installing smart card and it readers unauthorized person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.