1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
7

It is 10PM and you are inside in the middle of a large building. Your cell phone is dead so you cannot use wifi or cell signals

to find your location. Unfortunately, your GPS unit cannot find your location either! This is because:
your GPS unit cannot send signals to the satellite when it cannot reach it by line of sight.

it is nighttime and the GPS does not work without sunlight.

GPS relies on the cellular network to send and receive signals.

your GPS unit cannot receive satellite signals when you are indoors away from windows.
Computers and Technology
1 answer:
kupik [55]3 years ago
4 0

<em>The answer is: your GPS unit cannot send signals to the satellite when it cannot reach it by line of sight. </em>

<em> </em>

<em>GPS signals are based on frequencies that can be blocked by solid objects (like walls and roofs). A GPS device is using a series of satellites to detect and see where it is physically located. These frequencies are sent from these plates (satellites) and we cannot expect it to go through all kinds of barriers. When you use a GPS inside a building, a wide variety of physical barriers and potential interference sources make it difficult for the device to detect your location accurately. </em>

<em> </em>

<em />

You might be interested in
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
What’s the answer for this
attashe74 [19]
I believe the answer is B<span />
3 0
3 years ago
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
Is prediction harmful or not , why​
Marrrta [24]

Answer:

It's Not At All Because It's Just Like Yku Thinking Of Something

Explanation:

not at all

8 0
3 years ago
Vinton cerf has been called one of main fathers of the internet. what internet organizations did he chair or help found? what in
Strike441 [17]
<span>He served from 2000-2007 as chairman of the board of the Internet Corporation for Assigned Names and Numbers (ICANN), an organization he helped form. </span>Cerf<span> is the co-designer of the TCP/IP protocols and the architecture of the </span>Internet<span>.</span>
5 0
3 years ago
Other questions:
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • If there is a slow internet connection or limited access to certain sites it is often better to _________ a video file before st
    9·2 answers
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • How do you change your username
    6·2 answers
  • In relation to data science,advances in technology has made it more feasible to do what
    5·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
  • Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign
    14·1 answer
  • When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
    13·1 answer
  • As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!