1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
4 years ago
7

Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co

mputer or information system, in fact, are today. There are obvious benefits, but are there risks as well? For instance, would you feel more or less comfortable riding on a roller coaster that was computer controlled? Do the benefits of computerizing an increasing number of everyday objects outweigh the potential risks? Why or why not?
Computers and Technology
1 answer:
lisabon 2012 [21]4 years ago
4 0

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

You might be interested in
What does network administration normally include? Check all of the boxes that apply.
Paul [167]

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

8 0
4 years ago
In most operating systems what is running application called?
Likurg_2 [28]

Answer:

I believe it is just a task. Since there exists(on windows) the Task Manager application, where you can stop any running <em>task, </em>I think that they are called tasks

Explanation:

5 0
3 years ago
Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told h
tigry1 [53]

Answer:

boot the computer from the windows installation disk and run startup repair

Explanation:

Based on the scenario being described within the question it can be said that the best option in this situation would be to boot the computer from the windows installation disk and run startup repair. This will analyze all windows files and clean up any files or malicious software that does not belong in order for the system to be able to correctly boot into the operating system. Then from inside the operating system you can run a full diagnostic of the system.

4 0
3 years ago
What are the events?
erastovalidia [21]

Answer:

a thing that happens or takes place, especially one of importance.

8 0
3 years ago
The type of wireless access that uses a modem to connect to cell towers is called ___
Alex_Xolod [135]

Answer:

What are the Wireless Broadband Technologies?

What are the Wireless Broadband Technologies?

Wireless broadband services are similar to wired broadband in that they connect to an internet backbone usually a fiber-optic trunk; however they don’t use cables to connect to the last mile or business/residences. Instead they use Wireless Fidelity (Wi-Fi) connections or radio waves. A computer or mobile device has a wireless adapter that translates data into a radio signal and transmits the signal using an antenna. A wireless router receives the signal, decodes it and then sends it to the Internet through a wired Ethernet connection.

Fixed wireless is a type of high-speed Internet access where connections to service providers use radio signals rather than cables. Fixed wireless offers connections speeds between 1 and 10 mbps and use transmission towers similar to cell phone towers that communicate to a resident’s transceiver equipment that, as the name implies is fixed at the premise. The transceiver equipment communicates with the providers’ ground stations.

Wireless fidelity (Wi-Fi) is a fixed, short-range technology that is often used in combination with DSL, fixed wireless, fiber, or cable modem service to connect devices within a home or business to the Internet using a radio link between the location and the service provider’s facility. Wi-Fi service can be available in your home or at community locations (airports, coffee shops, schools, businesses, etc.) and are often called “hotspots.” A Wi-Fi network uses radio waves, similar to two-way radio communications. A computer has a wireless adapter that translates data into a radio signal and transmits it using an antenna. A router receives the signal, decodes it, and then sends the information to the Internet using a physical connection, usually via an Ethernet cable, a cable that carries the broadband signal between the modem, router, computer, and other wired Internet capable devices.

Mobile Wireless (3G, 4G)

Mobile wireless is high-speed wireless broadband connection that is accessible from random locations. The locations depend on the provider’s cellular towers and monthly service plans. Many technologies make up wireless networks, but no matter the technology or acronyms you read or hear, mobile wireless networks are radio systems.

Mobile wireless services are continually being upgraded to provide data transmission speeds considered to be broadband. The faster mobile wireless networks are referred to as 3G or 4G.The “G” stands for “generation,” meaning 3rd and 4th generation or the evolution of broadband cellular networks; supposedly, each generation provides a faster more secure wireless network. A mobile wireless service requires a base station that is connected to a high capacity landline data transmission network to reach the Internet. In other words, it’s never wired OR wireless; ultimately, it has to be both. Wireless broadband in common usage means that the so-called “last mile” connection to the user is done via radio signals from a tower to a cell phone or other wireless devices (e.g., a tablet).

Long Term Evolution (LTE)

LTE is a 4G technology provides increased peak data rates, reduced latency, scalable bandwidth capacity than 4G predecessors. LTE can manage multi-cast and broadcast streams and handle quick-moving mobile phones. It uses an IP-based network architecture that allows for seamless handovers for voice and data to older model cell towers.

Satellite

Satellite broadband is sometimes the only option available to users in very rural or sparsely populated areas. Like telephone and television services, satellites orbiting the earth provide necessary links for broadband. With satellite service, you must have a clear view of the southern sky. Satellite service can be disrupted by weather conditions and changes in line of sight to the orbiting satellite. Satellite may have a higher monthly service charge than other broadband options and the need to purchase more home or business equipment compared to the other options. Because satellites are located a significant distance from customers, there are issues of “latency” and therefore a noticeable time lag between sending and receiving data by the end customer.

Downstream and upstream speeds for satellite broadband depend on several factors, including the provider and service package purchased the consumer’s line of sight to the orbiting satellite, and the weather. Satellite speeds may be slower than DSL and cable modem, but they can be about 10 times faster than the download speed with dial-up Internet access. Service can be disrupted in extreme weather conditions.

Source: Information from Wisconsin’s Broadband Reference Guide produced by: WI Public Service Commission, UW-Extension Madison, and the Center for Community Technology Solutions, January 2014

Explanation:

8 0
3 years ago
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • What is heaven backwards?
    11·2 answers
  • By default, EC2 instances pull SQS messages from an SQS queue on a FIFO basis.
    6·1 answer
  • مسألة لبرنامج الماتلاب لمصفوفة وعمود
    10·1 answer
  • Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entrega
    10·1 answer
  • If you get your foot stuck in a cloud how many colors can you smell with you ears
    8·1 answer
  • Cuales fueron las consecuencias que creo el storm worm (gusano storm, el informatico)??
    5·1 answer
  • Mention any
    14·1 answer
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
  • in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!