1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
6

Jake really works well with numbers and is skilled with computers but doesn't work well with others. Which of the jobs discussed

in this unit might be best for Jake? Why?
Computers and Technology
2 answers:
gladu [14]3 years ago
5 0

Answer:

bteasdale09

Explanation:

snap!!!!!!! above you have to be hot

tatiyna3 years ago
4 0

Answer:

i have the same quistion it is tec whith coputers and lectroniks

You might be interested in
What kind of information can be found in a ROM:
tester [92]
The answer is C, ROM often stores the basic instructions a computer needs when powering on, part if the BIOS.
3 0
3 years ago
IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector
ololo11 [35]
#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}
6 0
3 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
jonny [76]

Answer:

C. Z-wave

Explanation:

The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.

The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.

The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.

<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.

<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.

<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.

6 0
4 years ago
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.
Sedbober [7]

Answer:

developed and tested.

Explanation:

5 0
2 years ago
Other questions:
  • What is the outside of an iPhone called?
    9·2 answers
  • Negative methods of behavior correction include all but this:
    9·1 answer
  • Describe the following types of Cloud services:
    11·1 answer
  • What is Product Owner work that a Product Owner might delegate?
    10·1 answer
  • 2. How do cell phone users stay connected to the network as users move between cells?
    10·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • Is it possible to construct a wait-free n-thread PeekableStack(2) object from an arbitrary number of atomic Stack objects and at
    11·1 answer
  • Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out
    13·1 answer
  • Jim is working on a network design for a small office running a Windows file and printer server with Internet
    15·1 answer
  • Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!