At what layer of the osi model do the 802.11 standards vary?

Answers

Answer 1
The 802.11 standards are defined from IEEE and represent a set of specifications for the Media Access Control (MAC) and physical layer for the Wireless Local Area Network (WLAN) networks. The WLAN communication networks operate in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
The 802.11 standards vary at the physical layer of the OSI model, because there it is defined at which frequency band the network operates.
 

Related Questions

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

Answers

A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program that gets the requests from clients and seeks resources from other servers. It is a intermediary point between the end user and the backbone network.

Which tool helps an artist organize pieces of an image?
A.Selection
B.Shape
C.Layer
D.Hand

Answers

Answer:

c

Explanation:

this is the anwser bcs it is

The tool which helps an artist organize pieces of an image is Layer. The correct option is C.

What is a tool?

A tool is a button or an icon that helps doing particular task.

To organize pieces of an image, an artist needs Layer tool.

Thus, the correct option is C.

Learn more about tool.

https://brainly.com/question/19707541

#SPJ2

When working with a table, combining two or more cells into one is known as _____.
a).splitting
b).wrapping
c).merging
d).hyphenating

Answers

c) Merging is the answer

What method is used to manage contention-based access on a wireless network?

Answers

The answer is CSMA/CA*

Over their whole lifetime, about how much can someone with a professional degree expect to earn compared to someone with a high school diploma who didn’t attend college?

A. The same amount.
B. Twice as much
C. Three times as much
D. Four times as much

Answers

As per the question if anyone has a professional degree such as dentistry or in field of management as compared to that of the high school diploma and someone who didn't even attend the college.

the person can earn about 3 times more than the Person who is a graduate or a person who has no work experience or a technical professional degree. The value and fees of the degree vary so does the rate of pay.

Hence the option C is correct.

Learn more about the lifetime, about how much can someone with.

brainly.com/question/11387876.

Which network component connects a device with the transmission media?

Answers

The network interface card (NIC) is a component of the network that connects a device with the transmission media. NIC is a computer hardware component that allows a device to send and receive messages over the transmission media.This network adapter can be built in the computer, or later added to the computer.

When creating a query using the query design command, first you must ____?

Answers

You must first locate the queries group on the create tab. This tab contains the commands used to create queries. MS Access will switch itself to the query design view. A show table dialog box will appear and you will be able to select a table you would want to run a query on.






Final answer:

The first step in creating a query using the query design command is to select the tables or queries with the data needed for the query.

Explanation:

When creating a query using the query design command, first you must select one or more tables or queries that contain the data you want to work with in your query.

This is done after clicking the Query Design button on the Create tab and opening the Show Table dialog window. It's essential to only add tables or queries that have fields you intend to use; adding extra ones that you don't use can lead to incorrect results, unless they are necessary to join other tables in the query.

What is the navigation aid that shows users the path they have taken to get to a web page located within a website?

Answers

The breadcrumb trail is the navigation aid that shows users the path they have taken to get to a web page located within a website. This graphical control element helps and allows users to keep track of their locations within programs, documents, or websites.
Example: a user can see where the current page is in relation to the Web site's hierarchy.

Which step is not part of planning a worksheet design?

Answers

The question above has multiple questions as below;

A)     Decide what inputs values are needed

B)      State the purpose of the worksheet

C)      Decide what output are needed to achieve the purpose

D)     Enter labels, values and formulas

The answer is (D) Enter labels, values and formulas


The first few steps of planning an effective worksheet is to state the purpose of the worksheet. Whoever is working on the worksheet should invest their time to plan and design the sheet to meet their goals. The designer should also make it obvious where the user is supposed to input data. Other planning techniques include data validation and protection options.






Automatic updates policies affect user or computer accounts, depending on which ou they're linked to. true or false?

Answers

 Automatic updates are utilities used for installing software patches. 
The statement that automatic updates policies affect user or computer accounts, depending on which OU they're linked is false.
In contrast, the automatic update policies does not affect the accounts and users can't change Automatic Update settings.

Answer: false

Explanation:

What career cluster does a fish and game warden fall in?

Answers

The answer is Law, Public safety, Corrections & Security career cluster.

This cluster is organized into several career paths that include emergency and fire management, Law enforcement services, legal and correction services. Fish and Game Wardens main tasks include, investigate hunting accidents or reporting of fish or game law violations and preserve native wildlife and ecosystems.





Final answer:

A fish and game warden's career is categorized under the Law, Public Safety, Corrections, and Security cluster. They enforce wildlife protection laws and focus on conservation and sustainable management of natural resources.

Explanation:

The career cluster that a fish and game warden falls into is typically categorized as Law, Public Safety, Corrections, and Security. Fish and game wardens are responsible for the enforcement of laws that protect wildlife. This involves patrolling forests, parks, and waterways, conducting inspections, investigating violations, and educating the public about conservation efforts. They play a crucial role in wildlife management and the conservation of natural resources, ensuring that wildlife populations are sustainable and ecosystems are protected. A fish and game warden falls under the Natural Resources and Agriculture career cluster.

At which layers of the osi model do 802.11 wireless lans function

Answers

At the data link and physical layers

The 802.11 wireless Lan function is a set of data link and physical layers. Data link layer or the MAC is responsible for effective link-link data transfer, addressing, error detection and frame validation. Physical layer on the other hand helps in placing bits on the network. Basically, all wireless and WI-FI systems conform use these two layers to format and control data to conform with 802.11 wireless Lan standards





According to Fourman, Informatics is _______________ with a very _____________ scope.

Answers

Informatics is the science of information (Information science) with a very broad scope.


Informatics studies the representation, communication, and processing of information in artificial and natural systems. Technically, it is the focus of info and how it is represented in (includes paper, digital records, sounds and image), processed by (include human reasoning or digital computation), and communicated within a variety of systems through human communication and human computer interface.

Informatics has various aspects that encompass a number of existing academic disciplines like AI, cognitive science and computer science.  






Informatics is the science of information (Information  science) with a very broad scope.

Further Explanation:

Informatics is the study of the structure, behavior, and interactions of natural and engineered computational systems. Informatics studies the representation, processing, and communication of information in natural and engineered systems. It has computational, cognitive and social aspects. It provides different key points are as follows.

Informatics studies the representation, communication, and processing of information in artificial and natural systems.  Technically, it is the focus of info and how it is represented in (includes paper, digital, records, sounds and image), processed by (include human reasoning or digital computation), and communicated within a variety of systems through human communication and human computer interface. Informatics has various aspects that encompass a number of existing academic disciplines like AI, cognitive science and computer science.  

Learn more:

Why are healthcare informatics important

        brainly.com/question/2796376

Keywords: informatics, science, communication, natural systems, computer

If a user wished to insert a triangle or a callout figure in a document, he or she should select the _____ option.

Answers

The Insert Tab option

You can add a shape your word, excel or PowerPoint document to make a drawing. To do this in MS Word, click on the Insert tab, and in the illustration group, click on the shapes option. Click the shapes or callouts that you would like to insert and then drag to place the shape anywhere in the document.






Answer:

shapes

Explanation:

i just did it lol

The version of Windows that first provided networking capabilities was _____.

Answers

Windows 3.1, I believe.
 Windows for Workgroups

A word that has a specific, predefined meaning in a programming language is called

Answers

The correct answer is


A keyword

Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many

Answers

When two tables share the same primary key, they can be related through one-to-one, one-to-many, or many-to-many relationships, each serving a specific data structuring purpose in a database.

When two tables share the same primary key, there are several types of relationships that can exist between them. The most common types are one-to-one, one-to-many, and many-to-many relationships.

A one-to-one relationship exists when a row in table A can have only one matching row in table B, and vice versa, such as a person's social security number and their tax record.

The one-to-many relationship occurs when a row in table A can have many matching rows in table B, but a row in table B can have only one matching row in table A. This is the most common relationship found in databases. For example, a customer can have many orders, but each order is placed by one unique customer.

Lastly, the many-to-many relationship exists when a row in table A can have many matching rows in table B, and vice versa. This relationship typically involves a junction table to manage the associations, such as students enrolling in various courses and courses containing various students.

These relationships are crucial for determining how to structure tables within a database to avoid redundancy and ensure efficient data organization.

When two tables share the same primary key, they have a one-to-one relationship(option B)

This means that each row in the first table corresponds to exactly one row in the second table, and vice versa.For example, consider a database where each person has only one passport number, and each passport number is assigned to only one person. Here, both the person and the passport tables would share the same primary key to represent this relationship clearly.

Other relationships like one-to-many, many-to-one, or many-to-many would require one or more foreign keys or intermediate tables, and sharing the same primary key would not apply to these scenarios.

Hence,option B is correct

Complete Question:

Which relationship is possible when two tables share the same primary key?

A.one-to-one

B.one-to-many

C.many-to-one

D.many-to-many

Which retouching action is unethical?
A. removing a person from a photograph intended for publication in a newspaper
B. removing the saturation in a photograph intended as a magazine cover page
C. adding extra lighting on subject’s face and body in a photograph meant for display in an exhibition
D. changing the color of the subject’s hair in a photograph intended for use in an advertising campaign

Answers

Answer:

It is  A. removing a person from a photograph intended for publication in a newspaper

Explanation:

The other answers are for artistic purposes.

The removing of a person from a photograph in order for achieving publication in newspaper is an unethical retouching action. Thus, option A is correct.

What is a retouching action?

A retouching action can be described as attempt of removing imperfections from a photograph. The feature can be used in photoshop where it has been utilized to Invert high-pass, frequency separation, Dodge & Burn, and many other.

The unethical retouching is considered as an important issue as it raises the question of brand honesty for clients. The intended publication that removes a person for newspaper publication is also considered unethical. Thus, option A is correct.

Learn more about retouching action, here:

https://brainly.com/question/11194216

#SPJ5



When proofreading, you should ____.
allow yourself some time between writing and proofreading
take the time to carefully look over your work
skim the document quickly
read aloud
ask someone else to look over the document

Answers

Take the time to carefully look over your work

E and A.

It's best to look over your work carefully so you can correct your errors. You should also ask someone to look it over in case it doesn't seem interesting.

Nowadays, computers can perform numerical calculations at lightning speed. The ________ was the first early computing machine that performed similar calculations.

Answers

in 1948 the "curta" calculator became the first mass-produced handheld calculator, but it was not lightning fast because it was hand cranked. 

The first electronic digital programmable computing device was called the Colossus, used during WWll to break German ciphers.

Between these two there were many more inventions of various improvements to computing involving speed, size, and information input/output. If these do no help please include more background in the question for a more specific answer.

"Nowadays, computers can perform numerical calculations at lightning speed. The ENIAC  was the first early computing machine that performed similar calculations."

____ involves using the cloud for a vast majority of your computing needs.

Answers

Infrastructure as a service

What is the binary code that can represent most currently used language characters and is the standard used on the internet?

Answers

The answer is Unicode

In the earlier days, all that existed was ASCII. Years down the line came UNICODE. Unicode assigns a code point which is a unique number assigned to every character. In the computing world, Unicode is the industry standard for the consistent representation, encoding and handling of text in most world’s writing systems.


What is the most important thing you should avoid files and folders?

Answers

passwords!!!!!!!!!!!

The timechart command buckets data in time intervals depending on:

Answers

Depending on the time range or time span selected.

You can always leverage the timechart command and its functions to better provide and identify more contexts to discrete data. As in the example below, with the timechart command, you will bucket the events first into 5-minute interval. This is well specified by the span parameter.


Index=main sourcetype=access_combined |eval kb=bytes/1024 | timechart span=5m




Each slice in a pie chart represents a single value from a data series. ____________
a. True
b. False

Answers

True.


Got it from quizlet site

Each slice in a pie chart represents a single value from a data series is true statement.

What is Pie chart?

Pie charts, usually referred to as circular graphs, are a common approach to demonstrate how different amounts or percentages contribute to the overall sum. In these diagrams, the full pie symbolizes 100% of the total, and the pie slices represent different percentages of the total.

The primary scientific explanation for why visualization experts despise pie charts and why people adore them is that the human eye is incapable of appropriately comparing angles.

Drawing a pie chart by hand can be challenging, especially when there are delicate percentages involved.

Therefore, Each slice in a pie chart represents a single value from a data series is true statement.

To learn more about Pie chart, refer to the link:
https://brainly.com/question/9979761

#SPJ6

Which type of reading is associated with an entry-level job?
Autobiography
Novella
Poem
User's manual

Answers

User's Manual, I got this question for a test and this was the correct answer

Answer:

User's manual

Explanation:

The user manual is a publication that includes the most substantial of a subject. It is a guide that helps to understand how something works.

A User Manual is a technical communication document that seeks to provide assistance to subjects who use a system. Beyond its specificity, the authors of the manuals try to appeal to a pleasant and simple language to reach as many receivers as possible.

A frequent structure of the user manuals includes an introduction to the product in question, an index with the contents of the manual, the guide itself, a section of frequent problems and how to solve them, contact details and a glossary.

User manuals are usually written in different languages ​​and have both texts and images. In this way the understanding of the concepts is facilitated. Diagrams and schemes are also common.

What is the difference between spyware and adware

Answers

Spyware is considered a malicious program and is similar to a Trojan Horse in that users unwittingly install the product when they install something else. ... Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application.
Unlike spyware, adware does not perform malicious acts.Windows Defender helps protect you from spyware, but it's crucial that you also have antivirus software to help protect you against viruses. 

After an object has been instantiated, its methods can be accessed using the object's _____, a dot, and a method call

Answers

After an object has been instantiated, its methods can be accessed using the object's identifier, a dot, and a method call.
DOI stands for Digital Object Identifier, to permanently identifies an article or document and link to it on the web and can be  a string of numbers, letters and symbols.

The ________ enables a tech to perform most of the maintenance, upgrade, and configuration aspect of windows

Answers

The Control Panel enables a tech to perform most of the maintenance, upgrade, and configuration aspect of windows.
From this Microsoft Windows component the user can view and change system settings. these system settings include control of the user accounts, change accessibility options, networking settings, removing and adding hardware and software .

The _______ displays the name of the open file and the program.
a. title bar
b. paragraph mark
c. address link
d. status bar

Answers

The answer is a. Title Bar

The Title Bar displays the name of the program and the name of the current open file, whether it is just displayed or being edited. It is located at the top of the program window.
Other Questions
Which may lead to lower productivity because of a lack of incentives? The aspect of color that corresponds to names such as red, green, and blue is __________. What is the ratio of the number of cups of apple juice to the number of cups of lemon-lime soda? 1:24 24:1 1:6 6:1 What power does the Constitution give the president to act without Congress? (Select all that apply.) make laws veto legislation grant pardons declare war An antimicrobial chemical was added to a population of bacteria. the initial population was 107 living cells (10,000,000). after 2 minutes, only 106 cells still remained alive. after another 2 minutes (4 minutes of total treatment), about how many cells would still be alive? Which of the following is NOT a reason why communicable diseases, such as pneumonia, kill fewer people today than they did in the past?A.continuing medical advancesB.slower population growthC.improved living conditionsD.better preventive treatment The study of signs in verbal or written communication is called What percent is 6 out of 7? Identify the sentence that uses passive voice. A. This past Christmas, my nephew was hoping to receive some gift cards for his game system. B. Oscar Wilde once stated to a customs official that he had nothing to declare but his genius. C. The students are being instructed to use the side entrance to the dorm until further notice. D. Over 5,000 people, many of them having driven overnight, attended the concert in New York. One way in which Pax Romana and Pax Mongolia are similar is that both were characterized by a. political stability b. unifying religious institutions c. representative forms of government d. social equality for men and women Factories readily employed women and children because they received higher wages and benefits. a. True b. False CAN SOMEONE PLEASE HELP ME WITH THIS!! HELP PLEASE WILL GIVE BRAINLIEST ANSWER 5 QUESTIONS 48 POINTS! 5:8 = 42:56. true or false What is the apr on a loan that charges interest at the rate of 1.4% per month? Given: Q = 7m + 3n, R = 11 - 2m, S = n + 5, and T = -m - 3n + 8. Simplify [Q - R] + [S - T]. What is the minimum value of the parabola y= x^2+5x Which is not an appropriate thesis for an essay comparing the safety of artificial sweeteners?a.) Keitels use of statistics and government reports makes her argument that artificial sweeteners are safe more convincing that Blackwells assertion that they are not. b.) Keitel argues that artificial sweeteners are safe, and Blackwell asserts they are not. c.) Although both authors carefully document their sources and present ample evidence to support their claims, the statistics and expert testimony that Keitel cites is ultimately more convincing. d.) Blackwells reliance on personal stories and dated reports makes his argument less convincing than Keitels. what is the purpose of reading material for the very first time describe the connection between the history of the bicycle and the history of women at the end of the 1800s