1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
5

Why are some geo satellites not usually used for transmitting tcp/ip information?

Computers and Technology
1 answer:
charle [14.2K]3 years ago
6 0
TCP has flow control, which means a two-way connection must be present. Satellites are sometimes optimized for broadcasts, which is unidirectional (ie., sending, not receiving).
You might be interested in
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
Which of the following would you not see on a windows 10 start menu?
mixas84 [53]
Task view is the option that you would not see on a Windows 10 Start menu, whereas if you click the Windows button, you can see tiles with different applications, all of your apps in the form of tiles you can distribute according to your own taste, and power button where you can choose whether you want to shut down your computer, put it to sleep, or log out.
4 0
2 years ago
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
Which of the following code displays the area of a circle if the radius is positive? Question 4 options: if (radius <= 0) Sys
Marina CMI [18]

Answer:

(d) if (radius > 0) System.out.println(radius * radius * 3.14159);

Explanation:

Given

Code segment (a) to (d)

Required

Which is correct

Code segment (a): radius <=0

This means that radius is 0 or less, i.e. 0 or negative

Code segment (b): radius !=0

This means that radius is not equal to 0 i.e. it could be positive or negative but definitely not 0

Code segment (c): radius >=0

This means that radius is 0 or greater, i.e. 0 or positive

Code segment (d): radius >0

This means that radius is  greater than 0 i.e. positive

<em>Hence, (d) is correct</em>

3 0
3 years ago
Which of the following should be performed to prove the value of a security awareness training program?
Helga [31]

Answer:

Schedule a convenient time and location for the training, to include as many people as possible.

Explanation:

The main purpose of security awareness program is to educate people about computer security. A good security awareness program should educate people about corporate policies and procedures for working with information technology  thus option b is the right answer.

8 0
2 years ago
Other questions:
  • WILL MARK BRAILIEST IF ANSWERED FAST!!!
    8·1 answer
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • An iPad Is An Example Of Which Type Of Computer?
    11·2 answers
  • Netflix uses ________ analytics to suggest which movies we should watch as well as to develop new content that it is confident w
    7·1 answer
  • PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin
    5·1 answer
  • Select the correct answer.
    6·1 answer
  • Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securi
    5·1 answer
  • ☢☢☢does anyone know how to do the TYNKER CANNON assignment ( lesson 2 intro to game design) I'll give BRANLIEST(¬‿¬)❤ dont answe
    11·2 answers
  • What are TWO examples of soft skills?
    11·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!