List current FAA regulations for drones. Describe how the following use drones: commercial and media; scientific; military and law enforcement.

What will be an ideal response?

Current FAA regulations state that drones can fly nohigher than 400 feet, must stay within the operator'sline of sight, and cannot venture over airports or populatedareas. Newer FAA regulations require registrationof both the drone and the operator; they also restrictflights crossing state lines.?Commercial and Media UseAmazon captured the media's attention when itannounced plans to deliver packages using drones. TheFAA opposed this proposition, stating that drones hadto be flown within sight of the operator and cannotdrop cargo. Other commercial and media ventures,however, use drones for a variety of purposes. Insurancecompanies use drones to survey storm damage to buildingsand property. Sports photographers capture aerialfootage, especially for events such as hang gliding,snowboarding, and downhill skiing.?Scientific UseTheir inexpensive cost makes drones ideal forcash-strapped or small-sized scientific or conservation-relateduse where the risk might be great, such astaking pictures in the eye of a hurricane. Farmerscreate aerial maps to manage crop watering andfertilizing. Conservationists track endangered species,secure protectednesting areas,and map naturalresources. Scientistsattach specializeddiagnostic toolsto measure solarreflectivity of theAmazon rain forest,use thermal imaging cameras to measure endangeredplant temperatures, and measure hurricane pressuresand temperatures.?Military, Law Enforcement, and Other UsesMilitary uses of drones include surveillance of areasinto which it would be unsafe to send personnel, tosupply deliveries to combat areas, and even to detonateweapons. Law and safety officials also use droneseffectively.Medical personnel use drones to deliversupplies to remote regions and to retrieve medicalsamples. Firefighters locate forest fires with drones. Lawenforcement can photograph a complex crime scenefrom above without contaminating evidence.

Computer Science & Information Technology

You might also like to view...

A security policy is a _____.

a. set of guidelines b. set of transmission protocols c. written document d. set of rules based on standards and guidelines

Computer Science & Information Technology

The MAXIMUM aggregate function can work with Short Text data

Indicate whether the statement is true or false

Computer Science & Information Technology