1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
5

Please Help, Thank you!

Computers and Technology
1 answer:
nevsk [136]3 years ago
3 0

Answer: Devices connected in a Bluetooth network communicate with each other using ultra-high frequency (UHF) radio waves. These are electromagnetic waves with frequencies around 2.4 gigahertz (2.4 billion waves per second). UHF waves of different frequencies are used in microwave ovens, GPS systems and many other devices, White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. ... There are even courses, training, conferences and certifications for ethical hacking. A hub connects multiple computers together in a Local Area Network (LAN). All information sent to the hub is then sent through each port to every device in the network.

Hubs are unable to tell one computer from another, so they receive information on one port and then blindly forward it to all other ports — whether it was intended for those computers or not.

So even though you may only want to send information to one other computer, if you have five total computers on your network, then there will be four other computers receiving data that wasn’t intended for them. Showing results for are Infrared signals are suitable for long distance data communication..

Search instead for are Infra-red signals are suitable for long distance data communication..

Infrared laser systems can also be used for long-range communication (up to about 2.4 kilometres), with a maximum projected data rate of 16 Mbps. ... An infrared transmitting device, either a light-emitting diode (LED) or a laser diode, converts an electrical signal to an optical signal.

Web Browser is a software which is used to browse and display pages available over internet whereas web server is a software which provides these documents when requested by web browsers. ... Web browser sends an HTTP Request and gets a HTTP Response. Web server receives HTTP Request and sends a HTTP Response.

Simple LANs generally consist of cabling and one or more switches. A switch can be connected to a router, cable modem, or ADSL modem for Internet access. A LAN can include a wide variety of other network devices such as firewalls, load balancers, and network intrusion detection.

Coaxial cable, or coax (pronounced /ˈkoʊ. æks/) is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric (insulating material); many coaxial cables also have a protective outer sheath or jacket.

Terrestrial microwave- The most common type of microwave antenna is the parabolic “dish.”A typical size is about 3 m in diameter. The antenna is fixed rigidly and focuses a narrowbeam to achieve line-of-sight transmission to the receiving antenna. Microwave antennasare usually located at substantial heights above ground level to extend the range betweenantennas and to be able to transmit over intervening obstacles. To achieve long-distancetransmission, a series of microwave relay towers is used, and point-to-point microwave linksare strung together over the desired distance. Used in long haul telecommunicationsservice, as an alternative to coaxial cable or optical fiber.

You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets

You might be interested in
Write a program that helps a young student learn to make change. Use the random number generator to generate change amounts betw
erastovalidia [21]

Answer:

#include <iostream>

#include <stdlib.h>

using namespace std;

int main()

{

srand(time(0));

 

int coins = rand()%99 + 1;

int temp = coins;

cout<<"Enter the coins needed to make $0."<<coins<<"?"<<endl<<endl;

int a, b, c, d;

cout<<"Quarters? ";

cin>>a;

cout<<"Dimes? ";

cin>>b;

cout<<"Nickles? ";

cin>>c;

cout<<"Pennies? ";

cin>>d;

 

int quarters = coins/25;

 

coins = coins%25;

 

int dimes = coins/10;

 

coins = coins%10;

 

int nickles = coins/5;

coins = coins%5;

 

int pennies = coins/1;

 

if(((a*25) + (b*10) + (c*5) + (d*1))==temp)

{

cout<<"That's correct"<<endl;

 

if(a!=quarters || b!=dimes || c!=nickles || d!=pennies)

{

cout<<"The optimized solution is "<<endl;

}

}

else

{

cout<<"Not correct"<<endl;

cout<<"The solution is "<<endl;

 

}

 

cout<<"\tQuarters: "<<quarters<<endl;

cout<<"\tDimes: "<<dimes<<endl;

cout<<"\tNickles: "<<nickles<<endl;

cout<<"\tPennies: "<<pennies<<endl;

return 0;

}#include <iostream>

#include <stdlib.h>

using namespace std;

int main()

{

srand(time(0));

 

int coins = rand()%99 + 1;

int temp = coins;

cout<<"Enter the coins needed to make $0."<<coins<<"?"<<endl<<endl;

int a, b, c, d;

cout<<"Quarters? ";

cin>>a;

cout<<"Dimes? ";

cin>>b;

cout<<"Nickles? ";

cin>>c;

cout<<"Pennies? ";

cin>>d;

 

int quarters = coins/25;

 

coins = coins%25;

 

int dimes = coins/10;

 

coins = coins%10;

 

int nickles = coins/5;

coins = coins%5;

 

int pennies = coins/1;

 

if(((a*25) + (b*10) + (c*5) + (d*1))==temp)

{

cout<<"That's correct"<<endl;

 

if(a!=quarters || b!=dimes || c!=nickles || d!=pennies)

{

cout<<"The optimized solution is "<<endl;

}

}

else

{

cout<<"Not correct"<<endl;

cout<<"The solution is "<<endl;

 

}

 

cout<<"\tQuarters: "<<quarters<<endl;

cout<<"\tDimes: "<<dimes<<endl;

cout<<"\tNickles: "<<nickles<<endl;

cout<<"\tPennies: "<<pennies<<endl;

return 0;

}

Explanation:

  • Use the built-in rand function to generate a random coin.
  • Get all the required values for quarters, dimes, nickles and pennies and store them in variables.
  • Check if the coins give a value of temp, then answer is correct and the values of user will be added.
  • Optimum solution is displayed  If it does not matches with the optimum solution. Display that the answer is wrong along with solution.
6 0
3 years ago
David Rosen is credited with the development of which of these games?
nikklg [1K]
David Rosen is the CEO and lead programmer of Wolfire games. some of their games include Overgrowth, Desperate Gods, and Receiver.
4 0
4 years ago
All of these are required categories on a safety data sheet except
ale4655 [162]

I think it is D because you would need there contact information in case something happens not there trade name

3 0
3 years ago
Read 2 more answers
Which of the following best describes the infrastructure ISPs provide?
svet-max [94.6K]

Answer:

cables, towers, and underground tubes

Explanation:

Its certainly the above one, and through this internet service is being provided. So internet service is self-understood, and what ISP firstly provides are cables, underground tubes, and the towers. And it is only these all through which the ISP provides internet service. And remember we are in this question dealing with the infrastructure and not the services or products. Hence, phone service, websites, and files, as well as the emails, search engines, and the videos, are not the solution here as they are not the infrastructure. And ISPs never provide the computers, ethernet cables or keyboards.

Hence, the correct answer is as mentioned in the answer section.

4 0
3 years ago
Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000
LenaWriter [7]

Answer:

Soory! I can't tell please tell clearly

3 0
3 years ago
Read 2 more answers
Other questions:
  • Describe what a layer 3 router is and what are its advantages and drawbacks compared to other network devices.
    15·1 answer
  • The purpose of hazard lights is to
    7·2 answers
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • A network using multiple cell towers falls under which type of network?
    13·1 answer
  • The length property of the String object returns
    15·1 answer
  • This is a bit confusing to me. Could someone please help me! I have to use CSS to Design a Web Page. I will mark Brainliest!
    8·1 answer
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • What is the minimum number of bits you would need to represent a number on a 0 to 10 scale
    15·1 answer
  • There are two kinds of emotions: positive and negative. True False
    10·2 answers
  • A related database stores data in the form of______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!