1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
3 years ago
6

Which communication technology should you use if you need to connect three offices which are all within 3 miles of each other at

speeds up to 75 Mbps using antennas?
Computers and Technology
1 answer:
Serhud [2]3 years ago
7 0

Answer: WiMax (Worldwide Interoperability for Microwave Access)

Explanation: Worldwide Interoperability for Microwave Access(WiMax) is the technology with the wireless broadband that helps in the long distance communication.

The base station in WiMax is installed in the area of the service provider and the receivers are placed at the client's outlet.Thus, WiMax is used for the connection of the three offices as it can connect offices with the range of 3 miles and provides the connectivity  with the speed upto 75 Mbps

You might be interested in
2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
Leto [7]

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

4 0
3 years ago
You would like to narrow your search on this topic.
frozen [14]

Answer:

Not

Explanation:

cause we are excluding keywords in a search

3 0
3 years ago
Read 2 more answers
Please helpp!! I need it quickly!
gregori [183]

Answer:

a

Explanation:

5 0
3 years ago
________ is used by text recognition software to convert typed, printed, or handwritten text into the computer-based characters
Yuki888 [10]

Answer:

Optical Character Recognition

Explanation:

Optical Character Recognition (Reader) Shortened as OCR refers to the conversion of images (as well as hand writings or printed text) from scanned documents or images into text that can be stored (Soft-copy) in the computer.

This allows the information to be edited on the computer, In the most basic form the information is scanned with a photo scanner and then converted with a OCR to be edited with a word processor such as MS-Word

7 0
3 years ago
if i set my payment and use free trial on Scribd website, can i cancel my payment and NOT PAYING after one month??
svlad2 [7]
Yes you can, although, this question should have been directed towards the Scribd support team.
6 0
3 years ago
Other questions:
  • How is informatics affecting banking and financial institutions?
    13·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't
    12·1 answer
  • Create a program in Python that prompts the user to enter an integer number within the range of 1 to 10 inclusive. The program s
    15·2 answers
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • I have a question about a hotel tv: So I’ve brought my Nintendo Switch and my dock and plugged it in to the tv. Everything seems
    13·1 answer
  • 1. Write a program to input four numbers and store them in variables.
    6·1 answer
  • Write a pseudocode algorithm that prompts the user to enter a three-digit number and outputs the hundreds, tens and units.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!