"schools should use a wireless network instead of a wired network".

discuss this statement.

(6 marks) ​

Answers

Answer 1

hi there!

Answer:

I agree with this statement as wireless networks are better than wired ones especially for a huge structures like a school. in a big you will have to use kilometers of cables to set up a network, whereas you can set up the same network using a few access points and much less cables of course.

hope this helps.


Related Questions

Using PowerPoint or Impress guarantees that your presentation will do which of the following? stay on schedule and end on time be clear and understood keep your audience engaged and excited none of the above.

Answers

Answer: it will be none of the above

Explanation: i just took this test. the key word is "guarantees" so yeah.

Using PowerPoint or Impress guarantees that your presentation will: D. none of the above.

A presentation can be defined as an act of speaking formally to an audience, in order to explain an idea, piece of work, project, or product, especially with the aid of multimedia resources or samples.

Generally, a speaker can use either PowerPoint or Impress during the process of a presentation to share vital information with his or her audience.

However, none of the aforementioned software applications can guarantee that your presentation will:

Stay on schedule and end on time.Be clear and understood.Keep your audience engaged and excited.

Read more: https://brainly.com/question/10657795

Which line of code will allow the user to enter their current temperature to the nearest tenth of a degree?Group of answer choicesnum1 = input(""What is your temperature?"")num1 = int(input(""What is your temperature?"")num1 =float(input(""What is your temperature?""))1num = print(""What is your temperature?)

Answers

In programming we have different data types and in this question two data types was specified, Int and float, the only data type that can receive input to the nearest tenth of degree is float, hence, float(input(""What is your temperature?""))

Data types are use as place holders, we have the primitive and non-primitive data types

Example of data types are FloatArrayIntegerDoubleString

Learn more about data types at

https://brainly.com/question/179886

When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.

Answers

When you first purchase a notebook, make sure you have a RECOVERY CD. It enables the restoration of the notebook computer.

A recovery disc is a disc that enables to restore the computer to the same condition when it was bought.

Moreover, a recovery drive refers to a separate partition in the notebook that must contain the required files to restore the device if the system becomes unstable.

A recovery disc can be considered as a drive used to keep a backup of the files (e.g., images) and other types of restoration data.

Learn more about recovery disc here:

https://brainly.com/question/14217813

which computer belongs to the first generation?​

Answers

ENIAC (Electronic Numerical Integrator and Calculator .)

_______________: a group of people working together to achieve specific goals.
a.
Grapevine
b.
Compatible
c.
Lateral
d.
Organization


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

Organization

Explanation:

The other words have unrelated definitons to the definition given.

Answer:

organization

Explanation:

edge 2021

What commands does SuperKarel know that regular Karel does not?

turnleft() and jump()

O

turnRight() and jump()

O

turnAround() and turnRight()

O

turnAround() and jump ()

Answers

Answer:

turnRight and turnaround

Explanation:

The regular karel does not know these commands

The command that SuperKarel know that regular Karel does not is turnAround() and turnRight(). The correct option is C.

What is Karel?

Richard E. Pattis created Karel, an educational object-oriented programming language, to help teach programming to his Stanford University students.

Through simple object-oriented commands, the student learns to program by instructing Karel, a robot, to move, pick up a beeper, place a beeper, and turn off.

KAREL was developed as an educational tool to teach programming language elements to students studying robotics.

KAREL has since evolved into the primary FANUC programming language for robots and robot controllers. This powerful CNC programming language is extremely versatile.

SuperKarel understands two commands that regular Karel does not: turnAround() and turnRight ().

Thus, the correct option is C.

For more details regarding KAREL, visit:

https://brainly.com/question/13278951

#SPJ5

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

Answers

A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet

To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.

Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.

Read more on botnets at; https://brainly.com/question/13624552

The deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

Answers

Answer:

Virusus

Explanation:

-

Hope that helps

3.) The primary storage device that holds the data currently being processed by the computer is​

Answers

Computer memory I hope it works

Answer:

I personally think its a hard drive or something like that,im not a computer expert to be honest

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

Answers

Answer:

a hypothesis that forms into a question.

Explanation:

1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?

Answers

1. Column is like the one shows as A B C it’s like a Group. row is like each person from the group like Column A is the students names Column B is their 1st quiz grades I’m sorry if ur confused I’m bad at explaining it

A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

Answers

Answer:

A cellular network is a network...

_______________ provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

Answers

Answer:

account recovery

Explanation:

account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

You are in charge of setting up a network for a small office and ensuring its security. Describe how you will set up a small network.

Answers

hi there!

Answer:

setting up a small office network can be done with a LAN connection using a router, switch and some cables then we can connect all devices to the router through the switch using cables and it's done.

hope this helps.

If two nearby wireless devices (for example, a cordless phone or a wireless client) transmit using overlapping frequencies, those devices can interfere with one another. What is the term given to this type of interference

Answers

Answer:

wireless interference

Wireless interference is the term given to this type of interference.

What is wireless devices?

Any gadget that has the ability to communicate with an ICS net via microwave or infrared light, often to gather or maintain the data but occasionally to managing different set - point. Mobile nodes are any gadgets that communicate via RF signals. These gadgets include phone, baby monitors, and mechanical door openers, to name a few.

An intervention in communications occurs when a signal is altered in a disruptive way while it passes along one transmission medium in between the source and recipient. The phrase is frequently employed to refer to the addition of undesirable information to a signal that is otherwise good. Common illustrations include: electric sabotage (EMI).

Learn more about wireless devices, Here:

https://brainly.com/question/9979629

#SPJ5

List three (3) features of first generation computer

Answers

Answer:

features are

the first generation computer were based on vacuum tube technology

they were very large in size,very slow in speed and very low in capacity

they used to get heat very soon

Main electronic component – vacuum tube.

Main memory – magnetic drums and magnetic tapes.

Programming language – machine language.

Power – consume a lot of electricity and generate a lot of heat.

Do you want to run a listing to see files that were used by the last access date is date does not display by default which command would you use to find additional properties of the files to reference.

Answers

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "Get-childitem | get-member "

What is Get-childitem command?

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is Get-childitem | get-member

Learn more about Computer commands here: https://brainly.com/question/25243683

12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
Maybe
False
True

Answers

[tex]\blue{<><><><><><><><><><><><><}[/tex]

[tex]\green{<><><><><><><><><><><><><}[/tex]

Answer:

False

Explanation:

Because, aligment the tex are aligned in the centre of the page.

[tex]\pink{<><><><><><><><><><><><><}[/tex]

[tex]\red{<><><><><><><><><><><><><}[/tex]

False
:)))))))))))))))))

Wikis are designed for ________, which is allowing people to contribute more than just posting a response

Answers

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of customers in their forties (ages 40 to 49).

What is the missing line of code?

customerAges = [33, 23, 11, 44, 35, 25, 35, 68, 51]

count40s = 0
for item in customerAges:
_____;
count40s = count40s + 1
print("Forties:", count40s)


if 40 > item > 49

if 40 < item < 49

if 40 <= item <= 49:

if 40 >= item >= 49

Answers

Answer:

if 40>= item >=49

Explanation:

Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)

Answers

Answer: There are several different job types in this field.

Explanation: did the test and got it right

Answer:

A or C!

Explanation:

Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-

- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge

Answers

Hmmm when they say that we have a debt of $10,000 but you don't but you don't know that so they ask you for the personal data for your bank so their can get in and get the money for you so you don't have to and that how they trick you

The process of sending and receiving messages with words defines _____. A. Verbal communication b. Nonverbal communication c. Open communication d. Empty communication Please select the best answer from the choices provided A B C D.

Answers

The process of sending and receiving messages with words defines: A. Verbal communication.

Communication can be defined as a process which involves the transfer of a message from an individual (sender) to another (receiver or recipient), through the use of words, semiotics, symbols and signs, that are mutually understood by both the sender and the receiver.

In English language, there are different types of communication and these include:

Visual communicationNon-verbal communicationWritten communicationListening communicationVerbal communication

Verbal communication is also referred to as oral communication and it refers to the process of sending and receiving messages from one individual to another through the use of words.

Read more: https://brainly.com/question/14810228

Answer:

its a

Explanation:

yw

What is data communication.. ​

Answers

What is data communication?

The exchange of data between source and a receiver by way of transmission media such as a wire cable

Hope this helps you!!

9. Which of the following is a disadvantage of cloud storage? * Accessibility (offline/without internet) Reduction of storage cost to organization, Increased possibility for disaster recovery, Efficient management of stored Data​

Answers

Answer:

Accessibility offline

Explanation:

While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal

Answers

The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.

A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.

This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.

In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.

Read more: https://brainly.com/question/5660386

A multinational pharmaceutical company used a saffron trident in a promotional campaign for one of its drugs in India. The saffron trident, a religious symbol in India, was meant to indicate the three levels of efficacy of the drug but mistakenly conveyed a religious message to Indians. This miscommunication indicates a problem associated with which step of the international communications process?
i. information source selection
ii. media channel selection
iii. encoding
iv. noise cancellation
v. message transmission

Answers

Answer : Encoding

Explanation : Encoding refers to correctly coding the message so that the receiver gets the clear message without feating any misunderstanding.

Based on the given information, This miscommunication indicates a problem associated with the encoding step of the international communications process. Thus the correct option is 3.

What is communication?

Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.

In the given case, it is explained that during a marketing campaign for one of its medications in India, a multinational pharmaceutical company utilized a saffron trident to represent the drug's three degrees of efficacy.

The method used to transform thoughts into communication is called encoding. The communicator must start decoding in order to communicate meaning in the form of symbols that stand in for concepts or thoughts.

Therefore, option 3 is appropriate.

Learn more about Communication, here:

https://brainly.com/question/22558440

#SPJ6

x = 9 % 2if (x == 1):  print ("ONE")else:  print ("TWO")

Answers

Answer:

ONE

Explanation:

It prints one because % is modulus, which is remainder division. It divides the numbers provided and returns the remainder of the division. 9 / 2 = 4 with 1 remainder, which leads us to our answer.

what computer is designed for particular application​

Answers

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

solve each of the following a. 3x=27 ​

Answers

Answer:

3^(x)=27     x=3

Explanation:

3x3x3 27

:)

3ˣ = 27

Factorise 27.

27 = 9 × 3

27 = 3 × 3 × 3

27 = 3³

So,

3ˣ = 27

=》ˣ = ³

3³ = 27

_____

Hope it helps ⚜

Other Questions
Francis owns a cake shop. She is currently preparing cupcakes (x) and cookies (y) for two birthdayparties. The first birthday party ordered 20 cupcakes and 40 cookies and their total cost was $61. The second birthday party ordered 30 cupcakes and 30 cookies. Their total cost was $64.50. PLS HELP round to the nearest hundredth Which of the following minerals are NOT felsic?**quartzfeldsparolivinemuscovite what feelings and emotions do you think kipling was trying to inspire american in this poem simplify 10^9 divided by 10^7 Because many students try to maintain a healthy diet, Alma wants part of her paper to address students who wantto include more nutrients in their diet. Which fact from her list should she make sure to include in her paper?OA. Chocolate contains small amounts of caffeine..Chocolate can be expensive.OC.Chocolate contains many antioxidants. evaluate (2x+3y)2 solve anthropologist david vine studies the effects of u.s. militarization on the u.s. population as well as the effectiveness of military bases abroad. identify the statements that describe the effectiveness of u.s. military bases. Directions on a box of 5 cups of wallpaper paste are to mix the contents with 4 qt of water. To mix a smaller batch using 1 cup of paste, how much water (in ounces) should be added? note that 1qt=32oz Which statement best describes a dynamic character? Cuntos son cuatro ms sesenta y seis? Which of the following statements best describes African Americans struggles for freedom?Select the best answer from the choices provided.A. African Americans did not attempt to fight for their freedom until the war was over.B. African Americans showed interest in their freedom but did not actively fight for it.C. African Americans fought for their freedom before, during, and after the war.D. All answers are correct Out of 74 students in the gym, 55 are sitting on the bleachers and the rest are sitting on the floor. What is the ratio of the number of students sitting on the floor to the total number of student? Which countries have large population of protestants How did the Twenty-fourth Amendment affect the voting rights of African Americans?It prohibited state legislatures from selecting senators, giving African Americans a greater voice in the government.It eliminated poll taxes in all national elections, allowing many African Americans a chance to vote because they could now afford it.It expanded the vote to include all citizens 18 and older, providing voting rights for soldiers, who were predominantly African American.It required equal protection under the law for all citizens, extending all voting rights to African Americans. 1. How many feet long is the space Mr. Hamilton wants to fill with pictures? Explain how you know2. Convert this length to inches Jermaine and Kesha are married, file a joint tax return, have AGI of $82,500, and have two children. Devona is beginning her freshman year at State University during fall 2021, and Arethia is beginning her senior year at Northeast University during fall 2021 after having completed her junior year during the spring of that year. Both Devona and Arethia are claimed as dependents on their parents' tax return. Devona's qualifying tuition expenses and fees total $4,000 for the fall semester and Arethia's qualifying tuition expenses and fees total $6,200 for each semester during 2021. Full payment is made for the tuition and related expenses for both children during each semester. The American Opportunity credit available to Jermaine and Kesha for 2021 is: 62 out of 100 children prefer strawberries. What percentage of children prefer strawberries Describe the composition of the cell membrane n which sentence do the subject and verb agree?Glossy green leaves and brilliant sunlight has created a beautiful scene.Vitamins and minerals isn't equally present in all foods.A half of a grapefruit is waiting for me on the breakfast table.The night air, soft and cool, were blowing in through the car window.