A(n) _________ is an Earth-based device that sends and receives microwave signals.
A. microwave station
B. microwave hub
C. microwave router
D. microwave kernel

Fill in the blank(s) with the appropriate word(s).


microwave station

Rationale: A microwave station is an Earth-based device that sends and receives microwave signals. To avoid buildings, mountains, and the curvature of the earth obstructing the signal, microwave stations are usually placed on tall buildings, towers, and mountaintops. See 4-4: Networking Media

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) An intermediate operation specifies tasks to perform on the stream’s elements; this is efficient because it avoids creating a new stream. 2) Reduction operations take all values in the stream and turn them into a new stream. 3) If you need an ordered sequence of int values, you can create an IntStream containing such values with IntStream methods range and rangeClosed. Both methods take two int arguments representing the range of values. Method rangeClosed produces a se- quence of values from its first argument up to, but not including, its second argument. Method range produces a sequence of values including both of its arguments. 4) Class Files (package java.nio.file) is one of many classes throughout the Java APIs that have been enhanced to support Streams.

Computer Science & Information Technology

Something that has absolute uniformity in all its characteristics in all directions is called _____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What federation system technology uses federation standards to provide SSO and exchanging attributes?

A. OAuth B. Open ID Connect C. Windows Live ID D. Shibboleth

Computer Science & Information Technology

In which of the following attacks does an attacker use a previously unknown attack technique or exploit a previously unknown vulnerability?

A. Whaling attack B. Phishing attack C. Replay attack D. Zero-day attack

Computer Science & Information Technology