The key difference between a microwave radio system and a
satellite radiolink system is that:
A. microwave uses line-of-sight and satellite uses
transponders during transmission.
B. microwave operates through transponders placed on the
earth's orbit.
C. satellite uses line-of-sight during transmission.
D. microwave uses fiber optic cables.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The key difference between a microwave radio system and
satellite radiolink system is that microwave transmits along
the line-of-sight, while a satellite radiolink system
operates through transponders placed on the earth's orbit
and a microwave radio system operates on land along the line
of sight. Both microwave and satellite use electromagnetic
radiation and not fiber optic cables for their communication.
| Is This Answer Correct ? | 30 Yes | 3 No |
Answer / gndu student
microwave is used for cooking like pizza, murga etc..:P
n satellite is used for calling your girlfriend..<3
another use of satellite is we can watch world cup in TV :p
| Is This Answer Correct ? | 7 Yes | 7 No |
Answer / pir yaqoob shah
microwave is use for cooking.
and communication satellite is use for calling with girl friend.
| Is This Answer Correct ? | 4 Yes | 13 No |
Which of the following environmental controls is appropriate to protect computer equipment against short-term reductions in electrical power? A. Power line conditioners B. A surge protective device C. An alternative power supply D. An interruptible power supply
An offsite information processing facility having electrical wiring, air conditioning and flooring, but no computer or communications equipment is a: A. cold site. B. warm site. C. dial-up site. D. duplicate processing facility.
LANs: A. protect against virus infection. B. protect against improper disclosure of data. C. provide program integrity from unauthorized changes. D. provide central storage for a group of users.
Which of the following is the MOST effective type of antivirus software? A. Scanners B. Active monitors C. Integrity checkers D. Vaccines
To prevent unauthorized entry to the data maintained in a dial-up fast response system, an IS auditor should recommend: A. online terminals be placed in restricted areas. B. online terminals be equipped with key locks. C. ID cards be required to gain access to online terminals. D. online access be terminated after three unsuccessful attempts.
Neural networks are effective in detecting fraud because they can: A. discover new trends since they are inherently linear. B. solve problems where large and general sets of training data are not obtainable. C. attack problems that require consideration of a large number of input variables. D. make assumptions about the shape of any curve relating variables to the output.
A company performs full backup of data and programs on a regular basis. The primary purpose of this practice is to: A. maintain data integrity in the applications. B. restore application processing after a disruption. C. prevent unauthorized changes to programs and data. D. ensure recovery of data processing in case of a disaster.
Which of the following should be of MOST concern to an IS auditor? A. Lack of reporting of a successful attack on the network B. Failure to notify police of an attempted intrusion C. Lack of periodic examination of access rights D. Lack of notification to the public of an intrusion
An enterprisewide network security architecture of public key infrastructure (PKI) would be comprised of: A. A public key cryptosystem, private key cryptosystem and digital certificate B. A public key cryptosystem, symmetric encryption and certificate authorities C. A symmetric encryption, digital certificate and kerberos authentication D. A public key cryptosystem, digital certificate and certificate authorities
Controls designed to ensure that unauthorized changes are not made to information residing in a computer file are known as: A. data security controls. B. implementation controls. C. program security controls. D. computer operations controls.
Which of the following is a network architecture configuration that links each station directly to a main hub? A. Bus B. Ring C. Star D. Completed connected
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.