The key difference between a microwave radio system and a
satellite radiolink system is that:
A. microwave uses line-of-sight and satellite uses
transponders during transmission.
B. microwave operates through transponders placed on the
earth's orbit.
C. satellite uses line-of-sight during transmission.
D. microwave uses fiber optic cables.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The key difference between a microwave radio system and
satellite radiolink system is that microwave transmits along
the line-of-sight, while a satellite radiolink system
operates through transponders placed on the earth's orbit
and a microwave radio system operates on land along the line
of sight. Both microwave and satellite use electromagnetic
radiation and not fiber optic cables for their communication.
Is This Answer Correct ? | 30 Yes | 3 No |
Answer / gndu student
microwave is used for cooking like pizza, murga etc..:P
n satellite is used for calling your girlfriend..<3
another use of satellite is we can watch world cup in TV :p
Is This Answer Correct ? | 7 Yes | 7 No |
Answer / pir yaqoob shah
microwave is use for cooking.
and communication satellite is use for calling with girl friend.
Is This Answer Correct ? | 4 Yes | 13 No |
Which of the following data entry controls provides the GREATEST assurance that the data is entered correctly? A. Using key verification B. Segregating the data entry function from data entry verification C. Maintaining a log/record detailing the time, date, employee's initials/user id and progress of various data preparation and verification tasks D. Adding check digits
An organization has been an Internet user for several years and the business plan now calls for initiating e-commerce via web-based transactions. Which of the following will LEAST impact transactions in e-commerce? A. Encryption is required B. Timed authentication is required C. Firewall architecture hides the internal network D. Traffic is exchanged through the firewall at the application layer only
An IS auditor when reviewing a network used for Internet communications, will FIRST examine the: A. validity of passwords change occurrences. B. architecture of the client-server application. C. network architecture and design. D. firewall protection and proxy servers.
Which of the following would be considered an essential feature of a network management system? A. A graphical interface to map the network topology B. Capacity to interact with the Internet to solve the problems C. Connectivity to a help desk for advice on difficult issues D. An export facility for piping data to spreadsheets
The FIRST step in data classification is to: A. establish ownership. B. perform a criticality analysis. C. define access rules. D. create a data dictionary.
An IS auditor performing an independent classification of systems should consider a situation where functions could be performed manually at a tolerable cost for an extended period of time as: A. critical. B. vital. C. sensitive. D. noncritical.
Which of the following is the FIRST thing an IS auditor should do after the discovery of a trojan horse program in a computer system? A. Investigate the author. B. Remove any underlying threats. C. Establish compensating controls. D. Have the offending code removed.
The database administrator has recently informed you of the decision to disable certain normalization controls in the database management system (DBMS) software to provide users with increased query performance. This will MOST likely increase the risk of: A. loss of audit trails. B. redundancy of data. C. loss of data integrity. D. unauthorized access to data.
There are several methods of providing telecommunications continuity. The method of routing traffic through split cable or duplicate cable facilities is: A. alternative routing. B. diverse routing. C. long-haul network diversity. D. last mile circuit protection.
Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking
A control for a company that wants to prevent virus-infected programs (or other type of unauthorized modified programs) would be to: A. utilize integrity checkers. B. verify program's lengths. C. backup the source and object code. D. implement segregation of duties.
An IT steering committee would MOST likely perform which of the following functions? A. Placement of a purchase order with the approved IT vendor B. Installation of systems software and application software C. Provide liaison between IT department and user department D. Interview staff for the IT department