Is spread spectrum transmission done for security reasons in commercial WLANs?

Answers

Answer 1
Answer:

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.


Related Questions

What is the best for cleaning up scattered laser toner particles?a. Use a hair dryer to blow away the residueb. Use moist paper towels to wipe up particlesc. Use your shirt sleeve to make them disappeard. Use a vacuum cleaner equipped with a HEPA filter while wearing your PPE
A babysitter charges $2.50 an hour until 9:00 PM when the rate drops to$1.75 an hour (the children are in bed). Write a program that accepts astarting time and ending time in hours and minutes and calculates the totalbabysitting bill. You may assume that the starting and ending times are ina single 24-hour period. Partial hours should be appropriately prorated.
Most slide layouts include at least one ________ by default.Question 2 options:placeholderaction buttontransitionanimation
What type of result does the MATCH function, when used on its own, return?
1. (1 pt) Suppose you wish to run a program P with 37.5 x 109instructions on a 15 GHz machine with a CPI of 0.75. What is the expected CPU time to execute this program on this machine

In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 andB7 from cell B6 and then multiples the result by cell B8. please help with excel!! I'm so lost

Answers

Answer:

The formula in Excel is:

=($B$6 - $B$5 - $B$7)* $B$8

Explanation:

Required

Use of absolute reference

To reference a cell using absolute reference, we have to include that $ sign. i.e. cell B5 will be written as: $B$5; B6 as $B$6; B7 as $B$7; and B8 as $B$8;

Having explained that, the formula in cell B13 is:

=($B$6 - $B$5 - $B$7)* $B$8

No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have visited. Why might this be happening, and what is the first step you will take to correct this problem? Phishing Scam You just received an email message from someone requesting personal identification information. Believing the message was legitimate, you provided the requested information to the original sender. You now realize, however, that you might have fallen victim to a phishing scam. What are your next steps? Suspicious File Attachment You receive an email message that appears to be from someone you know. When you try to open the attachment, nothing happens. You attempt to open the attachment two more times without any success. Several minutes later your computer is running slower and you are having trouble running apps. What might be wrong? Antivirus Software Outdated After starting your computer and signing in to the operating system, a message is displayed stating that your virus definitions are out of date and need to be updated. What are your next steps? Laptop's Physical Security You plan to start taking your laptop to school so that you can record notes in class. You want to make sure, however, that your computer is safe if you ever step away from it for a brief period of time. What steps can you take to ensure the physical security of your laptop?

Answers

  • The steps a person can take to ensure the physical security of your laptop is to;
  • Always use a firewall.
  • Make sure your software up to date.
  • Use antivirus software

How can a person  physically secure their laptop?

A lot of laptops and desktop computers are known to have built-in slots that can connect with a cable lock.  A person can keep their Laptops from getting Lost or stolen by;

  • Keeping it locked.
  • Keeping it off the floor, etc.

learn more about laptop  from

brainly.com/question/21283135

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.

1. What are the advantages and disadvantages of technology in communication?

Answers

The advantages and the disadvantages of the communication with the used of the technology are: Quickly communicate and the lack of privacy.

What is communication?

The term communication refers to the exchange of thoughts, ideas, and messages that are shared between two or more people. Without language, a person can survive, but without communication, no one can survive. Communication is divided into two categories, such as interpersonal and intrapersonal.

Advantages of the communication with the used of the technology are:

  • Quickly communicate.
  • Easy to used.
  • Managed the data and share the data easily.

Disadvantages of the communication with the used of the technology are:

  • Privacy issues.
  • Hacking Data.
  • They recover the data all the time not to the easy.

Hence, the significance of the communication are the aforementioned.

Learn more about on communication, here:

brainly.com/question/22558440

#SPJ2

Answer:

ADVANTAGES:

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks

DISADVANTAGES:

1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...

2-Distraction from Real Life. ...

3-Potential for Misunderstanding. ...

4-Decline of Grammar and Spelling...

5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest disadvantage

Explanation:

The Spanning Tree Protocol operates at the Network layer of the OSI model.True

False

Answers

Answer:

False

Explanation:

The Spanning Tree Protocol operates at the Data link layer of the OSI model.

Spanning Tree Protocol (STP) is a bridge and switch (Layer 2 protocol). The STP specification is IEEE 802.1D. STP's primary aim is to guarantee that when you have redundant routes in your network, you do not generate loops. Loops to a network are fatal.

In computer programming, what is syntax?

Answers

Answer: syntax is a set of rules for grammar and spelling. In other words, it means using character structures that a computer can interpret

Answer:

in computer science, the syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions on that language.

What is the earliest version of the present day Internet?

Answers

Answer:

ARPANET is the earliest version of the present-day Internet.

Explanation:

ARPANET is the type of network that is used before the Internet in the year 1967. It was advanced in the control of U.S ARPA(Advanced Research Projects Agency). After the year of 1980, it was given to the military network for the protection of the data network but after all, it is for the small area network and the Internet is the World Wide network.