in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?

Answers

Answer 1

A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.

Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.

Learn more:

brainly.com/question/23886562


Related Questions

WHAT ACTIONS CAUSE SPAM ON LINKEDIN?

Answers

Answer:

LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.  

Spam occurs:  

1. When you send bulk of connect requests in a short time  

2. When you send irrelevant messages to prospects  

3. When you Perform overactivity  

4. When you use LinkedIn automation tools  

5. When you send spammy and sales-y messages  

All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.

After successfully completing your computer organization and architecture class, you have a brilliant idea for a new chip design that would make a processor three times faster than the fastest ones on the market today. Unfortunately, it will take you six years to save the money, create the prototype, and build a finished product. If Moore s Law holds, you should spend your money developing and producing your chip. Group of answer choices

Answers

Answer:

I don't think that's something you can ask brainly. sounds like a project to me, I could be wrong though. good luck

1.11 Additional practice: Output art1.12 zyLab training: BasicsWhile the zyLab platform can be used without training, a bit of training may help some students avoid common issues.The assignment is to get an integer from input, and output that integer squared, ending with newline. (Note: This assignment is configured to have students programming directly in the zyBook. Instructors may instead require students to upload a file). Below is a program that's been nearly completed for you.Click "Run program". The output is wrong. Sometimes a program lacking input will produce wrong output (as in this case), or no output. Remember to always pre-enter needed input.Type 2 in the input box, then click "Run program", and note the output is 4.Type 3 in the input box instead, run, and note the output is 6.When students are done developing their program, they can submit the program for automated grading.Click the "Submit mode" tabClick "Submit for grading".The first test case failed (as did all test cases, but focus on the first test case first). The highlighted arrow symbol means an ending newline was expected but is missing from your program's output.Matching output exactly, even whitespace, is often required. Change the program to output an ending newline.Click on "Develop mode", and change the output statement to output a newline: print(userNumSquared). Type 2 in the input box and run.Click on "Submit mode", click "Submit for grading", and observe that now the first test case passes and 1 point was earned.The last two test cases failed, due to a bug, yielding only 1 of 3 possible points. Fix that bug.Click on "Develop mode", change the program to use * rather than +, and try running with input 2 (output is 4) and 3 (output is now 9, not 6 as before).Click on "Submit mode" again, and click "Submit for grading". Observe that all test cases are passed, and you've earned 3 of 3 points.userNum = int(input())userNumSquared = userNum + userNum # Bug here; fix it when instructedprint(userNumSquared, end=' ') # Output formatting issue here; fix it when instructed

Answers

Following are Python programs to the given question:

userNum = int(input())#defining a variable userNum

userNumSquared = userNum * userNum#defining a userNumSquared that calculates the square value of userNum

print(userNumSquared)#print squared value

Output:

60

3600

Program explanation:

In the above-given python code, a variable "userNum" is declared that uses an input method with the int that only takes an integer value as an input.In the next line, another variable "userNumSquared" is declared that is used to calculates the square value of "userNum". After holding the square value it uses the print method to prints its calculated value.

Learn more:

brainly.com/question/14484366

How can using stringent security measures, such as two proxy servers with firewall, prevent a Trojan virus?

A. This would make the network virtually impossible to penetrate.
B. This would make the network more of a target.
C. It would become more difficult to penetrate the network, but still possible.
D. It cannot.

Answers

Answer:  C. It would become more difficult to penetrate the network, but still possible.

Explanation: Because its possible but you will have to see how big your network is, and its difficult but it can prevent a Trojan virus, and can deal with two proxy servers with firewall.

Hope I helped :)

What is low, high and machine level language​

Answers

Answer:

A high-level language is one that is user-oriented in that it has been designed to make it straightforward for a programmer to convert an algorithm into program code. A low-level language is machine-oriented. Low-level programs are expressed in terms of the machine operations that must be performed to carry out a task. In easy words high level languages are near to human beings and far from computer and low level languages are near to computers and far from human understandings.

Explanation:

Hope it Helps

HAPPY TO HELP

PLZ MARK AS BRAINLIEST

What are the major features of React?

Declarative
Centralized
Component-Based
Learn Once, Write Anywhere
Predictable

Answers

JSX - JavaScript Syntax Extension. JSX is a syntax extension to JavaScript.

Virtual DOM. React keeps a lightweight representation of the “real” DOM in the memory, and that is known as the “virtual” DOM (VDOM)

Performance. ...

Extensions. ...

One-way Data Binding. ...

Debugging. ...

Components. ...

State.

write a c++ program to calculate the factorial of a number

Answers

Answer:

#include <iostream>

int factorial(int n) {

 return (n > 1) ? n*factorial(n-1) : 1;

}

int main() {

 std::cout << factorial(5);

}

Explanation:

Above is an approach using recursion.

It will output 120, which is 5! = 5*4*3*2*1

CODE

#include <iostream>

using namespace std;

int main() {

   // Declare the variables

   int n = 19;

   long int factorial = 1;

   // Each time, the factorial multiplies by integers from 1 to the maximum number.

   for(int i = 1; i <= n; i = i + 1) {

       factorial = factorial * i;

   }

   

   // Display the factorial

       cout << factorial;    

   return 0;

}

EXPLANATION

Declare n and factorial as integers and long integers.

The "for loop" runs from 1 to the maximum number and increments by 1. The factorial multiplies each time by integers from 1 to n.

Print the factorial.

What is an example of an Experience component within an enterprise platform?​

Answers

Answer:

A

Explanation:

A system used for processing customer payments. A tool used to coordinate recruitment of new employees. A mobile app used by customers to place orders.

jjhb ft fv tuning Denise l Debbie

Answers

What








What the debbie



Answer: is Debbi

Explanation: and what

In what ways are computers being used to improve our quality of life

Answers

Explanation:

makes info easy to get

improves communication

enhances education

etc

plsss mark me brainliesttt

does The operating system assigns the file, name and location inside

Answers

Answer:

The operating system assigns the file its name, location, and size. When you add information to a word-processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage.

Explanation:

The operating system is designed and developed to assign the file, its name, size and location.

What is an operating system?

An operating system (OS) can be defined as a system software that is pre-installed on a computing device, so as to manage random access memory (RAM), software applications, computer hardware and all user processes.

In computer technology, the operating system is designed and developed to assign the file, its name, size and location.

Read more on software here: https://brainly.com/question/26324021

#SPJ2

what is the console.log function for?​

Answers

Answer:

to print any kind of variables defined before in it or to just print any message that needs to be displayed to the user

Explanation:

How could I change the hexadecimal number C7 to decimal

Answers

Answer:

199

Explanation:

C7

C is 12 in hexadecimal.

Convert hexadecimal to decimal use base 16.

(12x16^1) + (7x16^0) = 192+7=199

Www requires a tool called a

Answers

Answer:

The World Wide Web (WWW) requires a tool (software) called a HTTP. The full form of HTTP is Hypertext Transfer Protocol.0. It is a type of internet communication software that is needed for the publication of the website or www

Explanation:

Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations. Which type of malicious activity is this?

Answers

A rootkit is a malware-style terminology designed to infect an attacker's target PC and allow them to install many tools that use him for persistent wireless connectivity to the system.

It is an illegal computer program to enable continuous privileged access to a computer and hide its presence actively. In today's life, it often conceals their existence and actions from uses and other functionality of the system, especially spyware - for instance, trojans, worms, viruses.

That's why the rootkit is employed since it is developed in this case to access Victin's system at an administrator level.

Learn more:

brainly.com/question/3624293

30pts! PLEASE ANSWER FAST-BRAINLIEST WILL BE MARKED
the footer is a number and is used in checking to be sure the _____ has not changed​

Answers

the footer is a number and is used in checking to be sure the bottom margin of each page has not changed​

what are the things a computer can do?​

Answers

Answer:

It can run a bunch of special command that coder implanted and when you a normal person clicks something it runs smooth with no difficulty.

Question: 5
In 2014, what percentage of the world population has access to the Internet?
Less than 30%
Less than 50%
Over 50%
Over 80%
Please help

Answers

The answer would be less than 50

In 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.

As we know,

Internet, a system design that allows different computer networks all over the world to communicate, has transformed communications and methods of commerce.

Thus, in 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.

Learn more about computers here:

https://brainly.com/question/21080395

#SPJ2

Given a string, an integer position, and a character, all on separate lines, find the character of the string in that position and replace it with the character read. Then, output the result. Ex: If the input is: warn -D-D - Du 0 e the output is: earn Note: Using a pre-defined string function, the solution can be just one line of code. 1 #include 2 #include 3 using namespace std; 4 5 int main() { 6 string workStr; 7 int idx; 8 char newChar; 9 19 getline(cin, workStr); 11 cin >> idx; 12 cin >> newChar; 13 14 15 16 cout << workStr << endl; 17 18 return; 19} 1 2 3

Answers

Answer:

#include <iostream>

using namespace std;

const string replace(const string workStr, int idx, const char newChar) {

   string ans = "";

   for (int i = 0; i < workStr.length(); ++i)

       ans += (i != idx ? workStr[i] : newChar);

   return ans;

}

int main() {

   string workStr;

   int idx;

   char newChar;

   getline(cin, workStr);

   cin >> idx;

   cin >> newChar;

   

   cout << replace(workStr, idx, newChar) << endl;

   

   return 0;

}

Explanation:

Declares the necessary variables. Next read them  and finally call a replace user defined function to solve the problem.

The program is given in C++. So, the code must be completed in C++.

The missing part of the program can be completed with the following lines of code:

string newStr(1, newChar);

workStr.replace(idx,1,newStr);  

To complete the code, we first convert newChar to a string.

This is done using:

string newStr(1, newChar);

In the above code segment, a string variable newStr is initialized with the value of newChar

Next, replace the character of the string using:

workStr.replace(idx,1,newStr);  

The syntax of the above instruction is:

string-variable.replace(position, number of characters to replace, replacement string)

In this case,

The string variable is workStrThe position of string to replace is idxThe number of characters is 1 (because only one character is to be replaced)The replacement string is newStr

See attachment for the complete program and a sample run

Read more about C++ programs at:

https://brainly.com/question/24494143

A file system which used tables to store data is called ?

Answers

Answer:

The filesystem table is an array of entries that describe each filesystem implementation that is part of the system image. ... The data field contains any private data that the filesystem needs, perhaps the root of its data structures

"Flat file" is a file system that kids used to store table data.

Computer information collected where another comparable yet disaggregated informational string being saved as nothing more than a table of entries within a two-dimensional (2-D) database, is termed as a Flat file.This same majority of database systems like MS Access as well as FileMaker Pro could consume and utilize flat-file records across a broader related database system.

Learn more about flat files here:

https://brainly.com/question/21937138

Which type of database would be used to analyze hours worked per nursing unit in a healthcare facility?
A. Data warehouse
B. Data mart
C. Data mining
D. Distributed database

Answers

Answer:

a

Explanation:

a is a answer just in the question was a name is not true

Data warehouses are employed for commercial reporting and analytical needs. Any grouping of data that has been arranged for archiving, access, and retrieval is referred to as a database.

What is the difference between  database and data warehouse?

Any grouping of data that has been arranged for archiving, access, and retrieval is referred to as a database. In a data warehouse, copies of transaction data from several source systems are combined and made available for analytical use.

Data warehouses are employed for commercial reporting and analytical needs. Data warehouses often save copies of transaction data from several sources to store historical data. Real-time data feeds can also be used by data warehouses to provide reports that employ the most recent, comprehensive information.

A data warehouse is a central collection of data that can be examined to help decision-makers become more knowledgeable. Transactional systems, relational databases, and other sources all regularly and continuously feed data into a data warehouse.

Therefore, the correct answer is option A. Data warehouse.

To learn more about Data warehouse refer to:

https://brainly.com/question/25885448

#SPJ2

we can not split the cell true or fasle​

Answers

Answer:

You can't split an individual cell.

Explanation:

You can't split an individual cell, but you can make it appear as if a cell has been split by merging the cells above it.

In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a program that reads the width and height of the wall and the number of windows, using the prompts Wall width: Wall height: Number of windows: Then print the area with two digits after the decimal point: c

Answers

Answer:

The program in Java will be:

import java.util.Scanner;

public class Paint

{

  public static void main(String[] args)

  {

      final int COVERAGE = 350;  //paint covers 350 sq ft/gal

      final int DOOR = 20;

  final int WINDOW = 15;    

  //declare integers length, width, and height;

  int length, width, height, doors, windows;

  //declare double totalSqFt;

  double totalSqFt;

      //declare double paintNeeded;

  double paintNeeded;

    //declare and initialize Scanner object

  Scanner scan = new Scanner (System.in);

  //Prompt for and read in the length of the room

  // finish this -- length =  

  System.out.print("Enter the length of the room: ");

  length = scan.nextInt();

  //Prompt for and read in the width of the room

      System.out.print("Enter width: ");

  width = scan.nextInt();

      //Prompt for and read in the height of the room

  System.out.print("Enter height: ");

  height = scan.nextInt();

      //Prompt for and enter the number of doors    

  System.out.println("Enter the number of doors: ");

  doors = scan.nextInt();

  //Prompt for and enter the number of windows

  System.out.println("Enter the number of windows: ");

  windows = scan.nextInt();

  //Compute the total square feet to be painted--think

     //about the dimensions of each wall

      totalSqFt = 2 * width * height + 2 * length * height - DOOR*doors - WINDOW*windows;

      //Compute the amount of paint needed

      paintNeeded = totalSqFt / COVERAGE;

      //Print the length, width, and height of the room and the

      //number of gallons of paint needed.

  System.out.println("Length= " + length + "\nWidth= " + width +  "\nHeight= " + height + "\nNumber of doors: " + doors + "\nNumber of windows: " + windows + "\nGallons of Paint Needed= " + paintNeeded);Explanation:

Give three general reasons for the importance of computer networking.

Answers

I think the First reason is; it provides the best way of business communication.
Second reason, streamline communication
Third reason cost effective resource sharing :) (hope this helps)

The three general reasons for the importance of computer networking are to optimize convenience and flexibility, allow file sharing, sharing of peripherals and internet access, and network gaming.

What is computer networking?

Computer networking is the term for a network of connected computers that may communicate and share resources.

These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols. An electronic gadget called a node. The physical components are what have the ability to send, receive, or forward data.

Therefore, computer networking is crucial for three main reasons: to maximize ease and flexibility, to enable file sharing, to share peripherals and internet access, and to support network gaming.

To learn more about computer networking, refer to the link:

https://brainly.com/question/14276789

#SPJ5

Fill in the blank with the correct response.
A _
is an unknown network.

Answers

Answer:

ip address

Explanation:

please mark brainliest

The output signal from an analogue sensor is sampled every 195 µs to convert it into a digital representation. What is the corresponding sampling rate expressed in kHz?
According to the Sampling Theorem, for this sampling rate value, what approximately could be the highest frequency present in the signal, in kHz, assuming the lowest frequency is very close to zero?

If each sample is now quantised into 512 levels, what will be the resulting bitrate in kbps?

Give your answer in scientific notation to 2 decimal places.

Hint: you need to determine the number of bits per sample that produces 512 quantisation levels.

Answers

Answer:

A sample rate is just reciprocal of the sample period. According to sampling theorem the highest frequency in single would be [tex]5.13/2=2.565 KHz.[/tex][tex]2^8=512[/tex] So you will need 8 bits to represent.[tex]8 bits \times5.128\times(10)^3[/tex]samples [tex]=41.026[/tex] bits per second.

Explanation:

Sample period of 1 millisecond [tex]=1 kHz.[/tex]

Thus a sample period of [tex]0.195[/tex] milliseconds is

[tex]1/0.195=5.12820513 Hz[/tex]

To determine the sample after [tex]512[/tex] levels quantization, we need to find bits per sample that produces [tex]512[/tex] quantization levels.

Thus,

[tex]2^8=512[/tex]

So you will need 8 bits to represent.

8 bits [tex]\times5.128\times(10)^3[/tex] samples [tex]=41.026[/tex] bits per second.

Learn more about scientific notation, refer :

https://brainly.com/question/10401258

C++: Given three strings on separate lines, insert the contents of the second string in the first string right before the third string. Then,
output the result

Ex: If the input is:
FuzzyBear

Wuzzy

Be

the output is:
FuzzyWuzzyBear

Note: Using a pre-defined string function, the solution can be just one line of code.

(I tried using strVar.insert(partStr, str2) but was unsuccessful. I don’t know where I’m messing up. Thank you for your help. I’ve been trying to alter this code for a while now)

Answers

Answer:

Use the .find() function in your first string to give you an index.

Explanation:

Hi! I'm guessing you're taking COP2334 like me. A T.A. helped me figure out what I needed, so I'm passing it on.

Basically, you're given three strings and no integer to use as an index in order to insert the second line. Since you are required to have an index to use the .insert() function, this is "tear-out-my-hair" frustrating. What I failed to remember was that it is totally possible to use a function inside another function to get what you need!

You have been given is a hint as to where str2 goes, in the form of your 3rd string. If I'm right, all of the tests the system will run (mine is in Zybooks) will give a 3rd string that is inside the first string.

String 1: strVar: "FuzzyBear"

String 2: str2: "Wuzzy"

String 3: partStr "Be"

Open your statement with strVar and use the insert.() function. In the insert function, you are required to give a place to start, (your index), then what you want to insert. Your index will be the .find() function, searching in StrVar for partStr. The second part of the .insert() function is str2.

Hope that helps!

What was the fisrt computer?

Answers

Answer:

AtanasoffBerry Computer.  It was built by physics Professor John Vincent Atanasoff and his graduate student, Clifford Berry, in 1942 at Iowa State College, now known as Iowa State University.

Explanation:

The First computer is called The Babbage Difference Engine.

I hope this is what you needed

What enables image processing, speech recognition, and complex game play in Artificial Inteligence (AI)?

Answers

Y u no se me hace mal

Answer:

Deep Learning

Explanation:

Deep Learning

where do I go to ask help from a tech and internet expert. security and protection. I'm open to suggestions and guesses​

Answers

Answer:

from my own experience, the best place to call is your local Best Buy store. they have a group of technicians called the Geek Squad, and you can either call them for tech support or protection suggestions, or have them do maintenance on a device (both in store and at home)

Other Questions
anybody how to do this? the Constitution of the United can be calculates the measure of the diagonal of the following quadrilateral:please How is carbon stored in the environment? A car travels at a constant speed of 20m/s.Work out the distance travelled [in meters] by the car after (a) 4seconds (b) 12seconds (c) 3mins (d) 2hrs We want to factor the following expression:16x^4-(y-1)^2We can factor the expression as (U+V)(U-V) where U and V are either constant integers or single-variable expressions.photo:1) What are U and V?2)Factor the expression. The length of the side of a square that has an area of 10 square yards ______. Find f(3) f(2) f(1) f(0) f(-1) Mountains are found in which half of Texas?NorthernSouthernEasternWestern Lois makes customised tee-shirts. She advertises and receives orders through her own website. She buys blank tee-shirts for $1 each and $1 of fabric paint is used to produce the bespoke designs. She pays herself $6 per hour for her time to create the designs and package the teeshirts. In addition she makes a profit of 20% of the selling price. For how much will she sell a tee-shirt, if the artwork and packaging takes one and a half hours to complete? describe a difference between large and small proteins Find the value of xFind the value of xFind the value of x What is the impact of all the different emirates coming together in order to resolve conflict and engage in deliberations at the meeting of the Federal Supreme Council? Major producers of cotton include all of the following countries except 12The motion of an object can be described by it A.speed..position.C.direction.D.all of these 6x 2 y 324x 3 y 2 +3x(x 2 +5)+(x7)(x+7)+ y8x for x = 4 and y = 2. Show work please I need help asap Does anyone know how to do this I really need help on this? I'm confused on this one4x 8 = 124x 8 + 8 = 12 + 84x = 2044x =204x = how do i do it step for step I need help with #61 to #64 ASAP please and thank you . Could someone please help me with it I need to get it done ASAP