1. The two major types of metal electrical cable are:

wire and fibre
twisted pair and coaxial
twisted pair and fibre optic
coaxial and fibre optic

2. What are the most common forms of wireless connection?

infrared beams
microwaves
radio waves
all of the above

3. Wi-fi connections have limited range of :

10 metres
600 metres
20 metres
300 metres

4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.

True
False

5. True or False: Bluetooth will let you use a smartphone to share data or files with another smartphone?

True
False​

Answers

Answer 1

Answer:

I believe 1. is Wire and Fibre

2. Infrared beams

3. 20

4. False

5. False

I'm not 100% if any of this is correct.


Related Questions

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

In a closed isolated system such as the universe, the amount of _____________ does not change.
Group of answer choices

Energy

Radiation

Chemicals

Sun light

Answers

Answer:

Energy

Explanation:

Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's computer by a Web server destructive software robots working together on a collection of zombie computers via the Internet spider software used by a search algorithm to crawl various Web sites to return a query a common platform used by search engines to index the contents of a Web site a fraudulent e-mail attack that targets a specific person or organization by personalizing the message

Answers

Answer:

destructive software robots working together on a collection of zombie computers via the Internet

Explanation:

Botnets are devices controlled via the internet to achieve a goal that requires multiple computers working towards a shared task. e.g. Denial of service attacks and mass email messaging.

B. Direction: Choose the letter of the correct answer.
11. Filler comes from silex, raw linseed oil, and turpentine.
A. Shellac
b paste filler C. Varnish
d. paint
12. A kind of varnish that is not waterproof.
A Paint
b. Shellac c. Enamel
d. Lacquer
13. What kind of varnish that dries up easily and is not waterproof? It comes from lac gum
diluted in alcohol
A Varnish
b. stains c. Enamel d. Shellac
14. A kind of stain that is easiest to apply on wood.
a. Spirit stain b. fillers c Oil stain
d. paint
15. It prevents moisture on the wood that causes decay.
a. Enamel
b. paint
c. Varnish
d. lacquer​

Answers

That the whole paper bro

give me code so I can get rid of the time limit on my mac it is a mac big sure fully updated please help

Answers

Answer:

Explanation:

The time limit on your Mac is likely imposed by your parents. Mac OS allows parental control on children accounts. If you want to get rid of the time limit, you should log in using your parents' accounts.

What is wireless?

a network that covers a large geographical area
a network confined to a limited geographical area
the process of sending data to the receiving device
a method of connecting computers using radio signals instead of physical wires

Answers

Answer:

The correct option is;

A method of connecting computers using radio signals instead of physical wires

Explanation:

Wireless is the term used to describe a network connection between two or more devices, such as computers, mobile phones and routers, that make use of a radio signal system instead of physical wires for data connection between the nodes in the network

It enables the avoidance of the necessary cost involved in the process installing physical network wires in a premise

The three basic types are Wireless Wide Area Network, WAN, Wireless Local Area Network, WLAN, and Wireless Personal Area Network WPAN.

how computer viruses spread from one computer to another​

Answers

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

explain four sitting postures in a computer laboratory​

Answers

1. Push hips back
2. Adjust seat
3. Sit up straight and roll your shoulders back
4. Feet flat on floor

someone help me!! i just gotta match these

Answers

Answer:

emails - allow attachments of files, such as images.

reports - convey more factual data that helps facilitate decision making.

memorandum - are written in a block style, with the body text aligned along the left margin.

business letter - are one page long.

I hope it's correct.

What is different between science and technology





Answers

Answer:

Science involves observing a body of fact systematically through experiments while technology is the application of these established facts for the betterment of human lives and the world at large.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.

Basically, knowing how to use a technology simply means a scientist understands the appropriate method or technique to be used in the application of a technology such as when solving a problem. Also, knowing when to use a technology means to know the appropriate time to use a particular technology without it having any repercussion or adverse effect.

Generally, technology has impacted the world significantly and positively as it has helped to automate processes, increased efficiency and level of output with little or no human effort.

need the answer ASAP. I’ll mark brainliest

they’re all the same options for each sentence.

Answers

Answer:

Explanation:

pop(): Remove an item from the end of an array  

push(): Add items to the end of an array  

shift(): Remove an item from the beginning of an array  

unshift(): Add items to the beginning of an array

______ behavior expected from every professional​

Answers

Answer:

Respectful

Explanation:

Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"

Answers

Answer:

"3 to 4"

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

An email signature can be defined as a group of texts (words) that a sender adds to the end (bottom) of his or her new outgoing email message. It is considered to be a digital business card that gained wide acceptance in the 21st century. Also, an email signature is a good etiquette in all formal conversations because it provide the recipient some level of information about the sender of an email message.

Ideally, an email signature should be three to four lines and must contain informations such as name, website address, company name, phone number, logo, catch phrase or quote, social icons, etc.

Additionally, you shouldn't place an email signature at the top or anywhere else in the email except at the bottom, immediately after the closing line.

Which of the following allows computers to communicate with each other? RAM NIC Hard drive Floppy disk

Answers

Answer:

NIC (Network Interface Card)

Explanation:

A network interface card is used to connect a computer to a computer network allowing for data to be transmitted between computers.

A Program is an Algorithm – a set of directions for the computer to follow.

True
False

Answers

Answer:

True

Explanation:

30 points

A company values its data and therefore takes steps to ensure it is protected. Which of the following factors may be included in an AUP specifically to protect data?

(Choose all that apply.)

Use of nonsanctioned software on company computers.

Access to sensitive data should be limited to only employees that need the data to do their jobs.

Responsibility for keeping virus checker software is made explicit.

Staff should not read the news on CNN during company time.

They discover that employees, on company time and using company resources, disclose proprietary company information at social networking sites.

They discover that employees, on company time and using company resources, discredit their fellow employees at social networking sites.

Answers

Answer:

The options that apply are:

B, C, D,

Explanation:

AUP refers to the Acceptable Use Policy.

The AUP is usually created to protect company IT resources which include but are not limited to Data (as in information), Data (as in bandwidth) and general IT security.

When people are issued, an AUP, it is so that they understand that they aren't the only ones who need and who use the company's IT resources especially data, hence, they have to use the same responsibly.

So, it may be qualified as a "fair use policy".

It is usually created and administered by the owner, key administrator of an online network, website, or service.

It serves the purpose of providing guidance as to how the resource must be used.

Cheers

Does any one know how to code? If you do can you help me with my project?

Answers

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

i can help you man

-scav aka toby

:) y’all are so nice for helping me ty , but any idea what this is?

Answers

Answer:

Best way is 3

Worst way is the rest

Explanation:

Answer:

the answer is  3

Latent data is easier to find than visible data on a computer. True False

Answers

Answer:

False

Explanation:

"Visible data is data that the computer operating system is aware of and is easily accessible by the user or a trained professional. Latent data is data hidden in all kinds of places in the computer and the operating system is not aware of it nor does it know where to find it, nor does the untrained user." Latent data cannot generally be viewed through typical applications, whereas visible data can be.

Answer:

False

Explanation:

It is False

what is a robotic device?​

Answers

Answer:A robot is a programmable mechanical device that can perform tasks and interact with its environment, without the aid of human interaction. Roboticsis the science and technology behind the design, manufacturing and application of robots. The word robot was coined by the Czech playwright Karel Capek in 1921.

Explanation:

Answer:

A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within.

Explanation:

A robotic device is a device that can be programmed and possibly be automated

Explica el funcionamiento del puente de diodos. Indica los diodos que se encuentran en polarizacion directa en inversa en cada semiciclo de la onda alterna de entrada

Answers

Answer:

puente de diodos se utiliza cuando queremos transformar una señal de fase alterna en una continua, para tener la ruta actual que siempre va en la misma dirección.

En polarización directa, el flujo depende principalmente en los portadores mayoritarios. Debido a la región de empobrecimiento reducida, y a la atracción del potencial contrario al material, se incrementa la corriente que fluye a través del diodo.

Explanation:

espero y esto te pueda ayudar

You have previously used slicing with strings.

What is the output?

str = 'abcdef'
print(str[2:5])


cde

bcde

cdef

bcd

Answers

Answer:

cde

Explanation:

just took the test :)

Answer:

cde

Explanation:

Facial recognition software can do all of the following, except: Match photos based on facial features Generate a picture based on an eyewitness description Be used on a smartphone Search photo databases

Answers

Answer:

Generate a picture based on an eyewitness description

Explanation:

Facial recognition can only recognise faces it cannot generate new faces.

11.5 Code Practice Edhesive??

In this code practice, we will continue to employ W3Schools tools to practice writing HTML. You should have already read through the tutorials for the four HTML topics below, found in Lesson 11.5. Now, complete the exercises linked below for each topic. Once you complete these exercises, move onto the next set of instructions below.

HTML Styles (Links to an external site.)
HTML Formatting (Links to an external site.)
HTML CSS (Links to an external site.)
HTML Links (Links to an external site.)
Create a web page that has two paragraphs. One of the paragraphs should be aligned to the center and have red text. The other paragraph should be aligned to the right and be in italics. Refer to the sample below for clarification.

11.5 Code Practice example

Your program should begin and end with the following tags:



# Insert your code here!


In the programming environment, you will notice that once you type one tag (for example, the html opening tag), the environment automatically populates the closing tag for you. Be careful not to double up on closing tags, otherwise your HTML will not run.

As you write your web page, you can click the "Run Code" button to view it in real time.

Answers

Answer:

<html>

<body>

<p style="text-align:center;color:red;">This is a paragraph.</p>

<p><i> "This text is italic</i></p>

</body>

</html>

Explanation:

I got a 75%. Hope this helps.

HTML codes are placed in segments called tags.

Tags are divided into two

The opening tagThe closing tag

Take for instance, the opening and closing tags of the paragraph tag are <p> and </p>, respectively.

Having explained what tags are, the required HTML code is as follows:

<html>

<body>

<p align="center"><font color="black"> This is a paragraph 1</font></p>

<p align="right"><i> This is a paragraph 2 </i></p>

</body>

</html>

The paragraphs are aligned using center and right alignments, while the text in the first paragraph is colored using the color tag

Read more about HTML at:

https://brainly.com/question/25055825

Which of the following is NOT a function? print, input, if, capitalize?

Answers

Answer:

there are no options

Explanation:

why do we need to include this information about online platform?











꧁NOTE::::LINKS ARE NOT ALLOWED FOR THIS QUESTION꧂

Answers

Answer:

online platform is defined as a digital service that facilitates interactions between two or more distinct but interdependent sets of users (whether firms or individuals) who interact through the service via the Internet Like i said above, platforms enable interactions and transactions between interdependent groups. ... While traditional businesses create value by creating products or services, platforms create value by enabling these transactions.

Explanation:

~Bre

4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.

True
False

5. True or False: Bluetooth will let you use a smartphone to share data or files with another smartphone?

True
False​​

Answers

Answer:

4. flase

5. true

Explanation:

If your getting wifi signal on your phone right now while where running in your house or traveling through the kitchen, you don't have to sit in one spot.

I tried doing that with another phone but It didn't work... :(

Explain one rule the company must follow when using cookies on its website.

Answers

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

Finish the program by choosing the correct terms.

# Count the number of wins, losses. Find the sum of the opponent's points.
wins=0
losses = 0
sum = 0
_____ item in scores:

sum = sum + item[1]
if item[0] > item[1]
wins = wins +1
_____:

losses = losses +1

•Else
•For
•While

Answers

What are the exact numbers

Answer:

For

Else

Explanation: Got it right

What is the problem, if any, with the following code?The desired output is [3,19].

>>> aList = [19,3]
>>> aList[O] = aList[1]
>>> aList[1] = aList[O]
>>>aList

•There is no problem.

•You need a temporary variable to hold the value 3.

•You need parentheses around 0 and 1, as in
aList(0) and aList(1).

•You need to import list to use a list.

Answers

Answer:

             You need a temporary variable to hold the value 3.

Explanation: Other user is correct

The problem with the code is that you need a temporary variable to hold the value 3. which is the correct answer would be an option (B).

What is the temporary variable?

A temporary variable in computer programming is a variable with a brief lifespan, typically used to retain data that will be deleted quickly or before it can be placed in more permanent program memory.

The problem with the code is that you need a temporary variable to hold the value 3.

In the first line of the code, the list is initialized with the values 19 and 3. In the second line, the value at index 0 is assigned to the value at index 1, which is 3. This means that the list now contains values 3 and 3.

In the third line, the value at index 1 is assigned to the value at index 0, which is also 3.

This means that the list now contains values 3 and 3, so the output is [3,3] instead of the desired output [3,19].

To fix this problem, you can use a temporary variable to hold the value 3 before assigning it to the other index. The code would look like this:

aList = [19,3]

temp = aList[0]

aList[0] = aList[1]

aList[1] = temp

aList

To learn more about temporary variables click here:

https://brainly.com/question/20309413

#SPJ2

Other Questions
62,53,44,35find a20 Expand -2a(5b-3) Dayo and bunmi share a certain amount in the ratio 2:3 respectively. If dayo share is #120, find the amount Jennifer earns $6 for each lawn she mows. She mows 8 lawns each day. After mowing lawns for 4 days, how much money will Jennifer have earned? Copper can be shaped into wires because it is In a survey at a shoe store, 200 customers were asked whether they haverunning shoes or basketball shoes. The results are in the relative frequencytable.TotalHave running shoes0.18No running shoes0.28Have basketball shoesNo basketball shoes0.220.32TotalWhat percentage of the people surveyed have basketball shoes?A. 40%B. 46%C. 60%D. 54% A Pew Research study finds that 23% of Americans use only a cell phone, and no land line, for making phone calls (The Wall Street Journal, October 14, 2010). A year later, a researcher samples 200 Americans and finds that 51 of them use only cell phones for making phone calls.Set up the hypotheses in order to determine whether the proportion of Americans who solely use cell phones to make phone calls differs from 23%. how many pounds is a 1 pound rock? Drew has 4 pieces rope 1 meter long each. He cuts each rope into fifths. How long will each of the fifths be in centimeters? whats 10 + 5 ? weweweweweweweewewewew What is the volume? Please help!!!!!!!!!!!!! what is the median of the data:10,20,30,40,50,60,70,80,90. PWEASE HELP HELP HELP HELP Problem 4: Price-fixing Litigation(5 points) Background: Multiple regression is sometimes used in litigation. In the case of Cargill,Inc. v. Hardin, the prosecution charged that the cash price of wheat was manipulated in violation of the Commodity Exchange Act. In a statistical study conducted for this case, a multiple regression model was developed to predict the price of wheat using three supply- and demand explanatory variables. Data for 14 years were used to construct the regression equation, and a prediction for the suspect period was computed from this equation. The value of R2 was 0.989. Problem: Cargill, Inc. had priced the wheat at $2.13. Their legal team needed to demonstrate that the price was not artificially depressed. For purposes of this project, suppose the sample size was 100. Requirements: 1.(2.5 points) For the relevant case, the fitted model gave the predicted value $2.136 with standard error $0.013. Based on this, determine the 95% prediction interval for the price of wheat. 2.(2.5 points) Mhanifa please help this is due soon ! it takes 125.0ml of 3.5M hydrobromic acid to neutralize 75.0ml of lithium hydroxide. what is the concentration of lithium hydroxide Chloroplasts require oxygen.TrueOrFalse?? Please answer. No links please A map uses a scale of 3/4 in = 80 miles. If two buildings are 60 miles apart in real life, how far apart would they be drawn on the map? Light and radio are examples of the __________________________ or ______________________ energy form, which is ________________ because it is always moving. How did the League of Nations actually help the rise of dictators between the World Wars? A. They supplied them with equipment and money B. They had no real power/authority to stop them C. They were lazy and didn't care