The key difference between a microwave radio system and a
satellite radiolink system is that:
A. microwave uses line-of-sight and satellite uses
transponders during transmission.
B. microwave operates through transponders placed on the
earth's orbit.
C. satellite uses line-of-sight during transmission.
D. microwave uses fiber optic cables.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The key difference between a microwave radio system and
satellite radiolink system is that microwave transmits along
the line-of-sight, while a satellite radiolink system
operates through transponders placed on the earth's orbit
and a microwave radio system operates on land along the line
of sight. Both microwave and satellite use electromagnetic
radiation and not fiber optic cables for their communication.
Is This Answer Correct ? | 30 Yes | 3 No |
Answer / gndu student
microwave is used for cooking like pizza, murga etc..:P
n satellite is used for calling your girlfriend..<3
another use of satellite is we can watch world cup in TV :p
Is This Answer Correct ? | 7 Yes | 7 No |
Answer / pir yaqoob shah
microwave is use for cooking.
and communication satellite is use for calling with girl friend.
Is This Answer Correct ? | 4 Yes | 13 No |
A control that detects transmission errors by appending calculated bits onto the end of each segment of data is known as a: A. reasonableness check. B. parity check. C. redundancy check. D. check digits.
Which of the following is a telecommunication device that translates data from digital form to analog form and back to digital? A. Multiplexer B. Modem C. Protocol converter D. Concentrator
Which of the following procedures can a biometric system perform? A. Measure airborne contamination. B. Provide security over physical access. C. Monitor temperature and humidity levels. D. Detect hazardous electromagnetic fields in an area.
Which of the following network configuration options contains a direct link between any two host machines? A. Bus B. Ring C. Star D. Completely connected (mesh)
During the review of an organization's disaster recovery and business continuity plan, the IS auditor found that a paper test was performed to verify the existence of all necessary procedures and actions within the recovery plan. This is a: A. preparedness test. B. module test. C. full test. D. walk-through test.
An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password
An IS auditor performing a review of the backup processing facilities should be MOST concerned that: A. adequate fire insurance exists. B. regular hardware maintenance is performed. C. offsite storage of transaction and master files exists. D. backup processing facilities are tested fully.
Connection-oriented protocols in the TCP/IP suite are implemented in the: A. transport layer. B. application layer. C. physical layer. D. network layer.
Which of the following BEST describes the early stages of an IS audit? A. Observing key organizational facilities. B. Assessing the IS environment. C. Understanding business process and environment applicable to the review. D. Reviewing prior IS audit reports.
hello all i want to do cisa certification but dont have knowledge of auditing. i m fresher and ccna certified. so, please advice me how should i prepare .and having cisa certification is it easy to get a job. please reply as soon as possible.
Which of the following is a check (control) for completeness? A. Check digits B. Parity bits C. One-for-one checking D. Prerecorded input
A programmer managed to gain access to the production library, modified a program that was then used to update a sensitive table in the payroll database and restored the original program. Which of the following methods would MOST effectively detect this type of unauthorized changes? A. Source code comparison B. Executable code comparison C. Integrated test facilities (ITF) D. Review of transaction log files