3. Coaxial/telephone cable sends
during the data transmission
signal

Answers

Answer 1

Answer:

high frequency signal.


Related Questions

Which is the first computer brought in nepal for the census of 2028 B.S​

Answers

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.

write a program to input 3 numbers and print the largest and the smallest number without using if else statement​

Answers

Answer:

def main():

   # input

   num1 = int(input("Type in a number: "))

   num2 = int(input("Type in another number: "))

   num3 = int(input("Type in another number: "))

   list1 = [num1, num2, num3]

   # sorts the array

   list1.sort()

   # list1[-1] prints the first element in the array

   print("The largest number is: " + str(list1[-1]))

   # -len(list1) takes the length of the list, in this case 3, and makes it a negative number.  

   # That negative number is then used as an index for the list1 array in order to print the lowest number.

   print("The smallest number is: " + str(list1[-len(list1)]))

main()

Explanation:

Hope this helped :) I left some comments so you know what's going on. You can also use max(list1) and min(list1) but I chose indexing because indexing is the better way of doing stuff like this.

Have a good day!

When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choices begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.

Answers

Answer:

explain all background information first.

Explanation:

Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.

It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.

Help Pls
I need about 5 advantages of E-learning​

Answers

Answer:

Explanation:

E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...

E-learning leads to better retention. ...

E-learning is consistent. ...

E-learning is scalable. ...

E-learning offers personalization.

Answer:

E- learning saves time and money

E-learning makes work easier and faster

E- learning is convenient

E- learning is consistent

E- learning is scalable

Explanation:

when you learn using the internet, you save a lot of time by just typing and not searching through books

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.

Answers

Explanation:

With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.

The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.

A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents

Answers

Answer:

D. Excessive disk space consumption due to storing large documents.

Explanation:

When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.

Which describes the relationship between enterprise platforms and the cloud?

Answers

Answer:

All enterprise platforms are cloud based.

7. Which control is used to display multiple records in List Form
a) Data Grid View b) Textbox c) Label d) Button

Answers

Answer:

I think a is correct answer.

Answer:

A

Explanation:

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.

Answers

Answer:

The program is as follows:

import random

print("Rock\nPaper\nScissors")

points = int(input("Points to win the game: "))

player_point = 0; computer_point = 0

while player_point != points and computer_point != points:

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

   player = input('Choose: ')

   if player == computer:

       print('A tie - Both players chose '+player)

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

       print('Player won! '+player +' beats '+computer)

       player_point+=1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

print("Player:",player_point)

print("Computer:",computer_point)

Explanation:

This imports the random module

import random

This prints the three possible selections

print("Rock\nPaper\nScissors")

This gets input for the number of points to win

points = int(input("Points to win the game: "))

This initializes the player and the computer point to 0

player_point = 0; computer_point = 0

The following loop is repeated until the player or the computer gets to the winning point

while player_point != points and computer_point != points:

The computer makes selection

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

The player enters his selection

   player = input('Choose: ')

If both selections are the same, then there is a tie

   if player == computer:

       print('A tie - Both players chose '+player)

If otherwise, further comparison is made

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

If the player wins, then the player's point is incremented by 1

       print('Player won! '+player +' beats '+computer)

       player_point+=1

If the computer wins, then the computer's point is incremented by 1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

At the end of the game, the player's and the computer's points are printed

print("Player:",player_point)

print("Computer:",computer_point)

Write down the short history of COMPUTER? ​

Answers

Answer:

Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.


Which of the following is not a data visualization technique?

Answers

Answer:

Normalization

Explanation:

From the options given :

Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.

Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.

Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.

Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.

Answers

Answer:

The program is as follows:

def get_price(fruits):

   AllPrice = fruits.values()

   value_iterator = iter(AllPrice)

   mostExpensive = next(value_iterator)  

   for item in fruits:

       if fruits[item]>=mostExpensive:

           mostExpensive = fruits[item]

           fruitName = item

   print(fruitName)

fruits = {}

n = int(input("Number of Fruits: "))

for i in range(n):

   name = input("Fruit name: ")

   price = int(input("Fruit price: "))

   fruits[name] = price

get_price(fruits)

Explanation:

This defines the get_price function

def get_price(fruits):

This gets all price in the dictionary fruit

   AllPrice = fruits.values()

This passes the values to a value iterator

   value_iterator = iter(AllPrice)

This initializes mostExpensive to the first price in the dictionary

   mostExpensive = next(value_iterator)

This iterates through the elements of the dictionary  

   for item in fruits:

If current element is greater than or equals most expensive

       if fruits[item]>=mostExpensive:

Set most expensive to the current element

           mostExpensive = fruits[item]

Get the corresponding fruit name

           fruitName = item

Print fruit name

   print(fruitName)

The main begins here

This initializes the fruit dictionary

fruits = {}

This gets input for the number of fruits

n = int(input("Number of Fruits: "))

This is repeated for every inputs

for i in range(n):

Get fruit name

   name = input("Fruit name: ")

Get fruit price

   price = int(input("Fruit price: "))

Append name and price to dictionary

   fruits[name] = price

Call the get_price function

get_price(fruits)

what is a computer memory

Answers

Answer:

it is your answer

Explanation:

it is the storage space where data is kept.

To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure

Answers

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

what is computer? write about computer.​

Answers

Answer:

Is an electronic device used for storing and processing data.

You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."

Answers

Answer:

Code:-

using System;

using System.Collections.Generic;

class MainClass {

public static void Main (string[] args) {

int Val1,Val2,total;

string input;

double overall;

Console.Write("Cost of First Item (in $)");

      input = Console.ReadLine();

Val1 = Convert.ToInt32(input);

Console.Write("Cost of Second Item (in $)");

      input = Console.ReadLine();

Val2 = Convert.ToInt32(input);

total=Val1+Val2;

if (total >= 100)

{

overall=.9*total;

Console.WriteLine("Your total purchase is $"+overall);

}

else if (total >= 50 & total < 100)

{

overall=.95*total;

Console.WriteLine("Your total purchase is $"+overall);

}  

else

{

Console.WriteLine("Your total purchase is $"+total);

}  

}

}

Output:

Which of the following will cause you to use more data than usual on your smartphone plan each month?

a. make a large number of outbound calls

b. sending large email files while connected to wifi

c. streaming movies from Netflix while not connected to Wi-Fi

d. make a large number of inbound calls

Answers

Outbound calls. You would most likely make more calls TO people rather than receive.

(viii) Word does not allow you to customize margins.
true/false:-​

Answers

In Word, each page automatically has a one-inch margin. You can customize or choose predefined margin settings, set margins for facing pages, allow extra margin space to allow for document binding, and change how margins are measured.

I would say false

Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label

Answers

Answer:

D. changing the font of a label

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

Which of the following definitions best describes the principle of separation of duties?

Answers

Answer:

A security stance that allows all communications except those prohibited by specific deny exceptions

A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event

A security guideline, procedure, or recommendation manua

lAn administrative rule whereby no single individual possesses sufficient rights to perform certain actions

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

What do LinkedIn automation tools do?

Answers

Answer:

Most of the tools are used to perform simple repetitive tasks that take a lot of time if done manually.

 

1. Sending Connection requests  

2. Running Direct messaging campaigns  

3. Endorsing people’s skills.  

4. Collecting leads data  

5. Extracting data from LinkedIn  

With automation, it may seem like you’ve been dealt the ultimate hand.    

In addition, some of the latest LinkedIn automation tools run personalized campaigns that result in increasing:

 

1. Increasing networks  

2. Connections  

3. Leads  

4. Sales

How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array

Answers

Answer:

Explanation:

260 cost units, Big O(n) complexity for a push

Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be

Answers

558c::d367:7c8e:1216:0:66be

A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?

Answers

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

How do i connect WiFi on windows xp without icon?

Answers

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Answer:

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Other Questions
Many Americans approved of the use of atomic weapons on Japan despite their destructive power becauseA) they believed they were justified in striking first in order to protect themselvesB) they were eager to see if this new technology was effective in preventing warsC) they believed that the atom bomb would cause no more damage than regular bombsD) they were told that it was the only certain way to defeat the militant Japanese empire Capital has diminishing returns in the Solow model, but ideas do not have diminishing returns in the Romer model because Group of answer choices capital is scarce, but new ideas are not scarce. capital is a rival object, but ideas are non-rival. capital depreciates because it is a physical object, but ideas cannot depreciate because they cannot physically break over time. capital is excludable, but ideas are non-excludable. help asap------------ What changes needs to be made to sentence 15? Sam feels that students score better on math tests that take place on Fridays. The school provides Sam with the school math test average, but they cannot separate them by date taken. The school is too large for him to ask every student, so he randomly selects a sample of willing students' test scores after the next Friday's math test. He uses the method of hypothesis testing to compare the Friday scores against the true average of all scores. Frame the correct set of hypotheses for his research. Decide where the rejection region will lie. Which statement best fits with Sociocultural theory?Select one:a.Children learn because their successful attempts are positively reinforced by adults.b.We are evolutionarily prepared to learn.c.Development occurs as a result of inborn mechanisms.d.Children depend on assistance from adults and more expert peers as they tackle new challenges. Is there any way to tell the gender of a baby who has not yet been born before the mother has given birth? And is there any way to try and have a specific gender?*This is worth a lot of points due to the fact that I need to know build and sketch 2x2+7x+6) An advertiser goes to a printer and is charged $36 for 80 copies of one flyer and $46 for 242 copies of another flyer. The printer charges a fixed setup cost plus a charge for every copy of single-page flyers. Find a function that describes the cost of a printing job, if xx is the number of copies made. make a sentence which has a complex noun phrase as od Which is the king of all subjects? Turn into passive voice:1. It is alleged that he stole her watch.2. Collins looks very weak. He had better not do any heavy work.3. The train should have arrived at 3 o'clock according to the timetable. Ecosystems rely on interdependence between species to keep balance. Which of the following is a threat to a stableecosystem?A. Loss of biodiversityB. High biodiversityC. Low biodiversityD. Increase in biodiversity Which sentence from the passage contains objective language?(A) "Robots have been around longer than many people realize(paragraph 4)(B)Will humans become too dependent on machines and losethe ability to do things for themselves?" (paragraph 2)(c)"Instead of hiring workers to perform tasks on an assemblyline, factory owners used automated machines that could dothe work of several people." (paragraph 5)(d)"There was a time when robots and home automation werejust a fantasy." (paragraph 1) NEED ANSWER ASAPWILL GIVE POINTSWhich sentence best describes a conflict?A.A sports fan watches the big game.B.A fanatic starts questioning his beliefs.C.A werewolf roams the forest at night.D.A spy takes a photo of a document. In the given figure, if AOB is a straight line, then BOC is A manufacturing company has the following budgeted overhead costs: Indirect materials: $0.50 per unit; Utilities: $0.25 per unit; Supervisory salaries: $60,000; Building rent: $80,000. If the company expects to produce 200,000 units using 100,000 hours of direct labor, the standard overhead rate will be $ Test a claim that the mean amount of carbon monoxide in the air in U.S. cities is less than parts per million. It was found that the mean amount of carbon monoxide in the air for the random sample of cities is parts per million and the standard deviation is parts per million. At , can the claim be supported? Complete parts (a) through (e) below. Assume the population is normally distributed. Find the Antilog of 547.840 Karl listens to his colleague giving an overview of the store's new leave policy. What behavior can Carl show to show that he cares about what his colleague says? a) click with his finger on his knees b) confirm what is being said with the person next to him c) summarize what he heard at the end of the overview to his colleague d) say yes, ok repeatedly