1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
1 year ago
11

Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.

Computers and Technology
1 answer:
mina [271]1 year ago
8 0

Twisted copper telephone wire, coaxial copper cable, fiber-optical cable, and media for wireless transmission are all physical transmission medium.

A system or material that can mediate the propagation of signals for telecommunications purposes is referred to as a transmission medium. Typically, signals are applied to a wave of some sort that is appropriate for the selected medium.

For instance, data may modulate sound, and while air is a common transmission channel for sounds, solids and liquids can also be used. A useful transmission medium for electromagnetic waves like light and radio waves is vacuum or air.

Although a physical substance is not necessary for the propagation of electromagnetic waves, these waves are typically impacted by the transmission medium they pass through, for example, by absorption, reflection, or refraction at the interfaces between media. Therefore, waves can be transmitted or guided using technical devices.

To know more about transmission medium click here:

brainly.com/question/28113920

#SPJ4

You might be interested in
How do social media sites illustrate kindness?
xeze [42]
There are many ways it cna illustrate kindness, such as making friends with friendly people, keeping long distance relationships possible, raising awareness of an event
5 0
3 years ago
Create a program to calculate the wage. Assume people are paid double time for hours over 60 a week. Therefore they get paid for
Rus_ich [418]

Answer:

Written in Python

name = input("Name: ")

wageHours = int(input("Hours: "))

regPay = float(input("Wages: "))

if wageHours >= 60:

->total = (wageHours - 60) * 2 * regPay + 20 * 1.5 * regPay + regPay * 40

else:

->total = wageHours * regPay

print(name)

print(wageHours)

print(regPay)

print(total)

Explanation:

The program is self-explanatory.

However,

On line 4, the program checks if wageHours is greater than 60.

If yes, the corresponding wage is calculated.

On line 6, if workHours is not up to 60, the total wages is calculated by multiplying workHours by regPay, since there's no provision for how to calculate total wages for hours less than 60

The required details is printed afterwards

Note that -> represents indentation

4 0
3 years ago
What is network topology? PLZZZ HURRY
Mashcka [7]

Answer:

Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks.

7 0
3 years ago
Ayuda por favor.<br><br>Please help!!
rewona [7]

Answer:

I know you're going to delete my answer... But I have an essay which needs to be completed online and I need to ask a urgent question!

If you have a better reason WHY you need me to answer the RIGHT answer... Please reply.

Explanation:

8 0
3 years ago
To bundle links together in order to improve bandwidth availability and redundancy, what protocol is used
Daniel [21]

Answer:

Link Aggregation Control Protocol

Explanation:

Link Aggregation Control Protocol can be used to assist in the formation of port channel bundles of physical links.

Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data Units (LACPDUs) to each other to establish a link aggregation connection.

8 0
3 years ago
Other questions:
  • By default, a word document generally displays in ____ view.
    9·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • What is Quantum Cryptography? How is it different from Public and Private-key transactions?
    6·1 answer
  • Use the _______ to add a line or circle to your presentation.
    8·1 answer
  • Which data type is also called a binary object?
    9·2 answers
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • 9.
    15·1 answer
  • The goal of a system is to
    6·1 answer
  • Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!