1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
1 year ago
11

Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.

Computers and Technology
1 answer:
mina [271]1 year ago
8 0

Twisted copper telephone wire, coaxial copper cable, fiber-optical cable, and media for wireless transmission are all physical transmission medium.

A system or material that can mediate the propagation of signals for telecommunications purposes is referred to as a transmission medium. Typically, signals are applied to a wave of some sort that is appropriate for the selected medium.

For instance, data may modulate sound, and while air is a common transmission channel for sounds, solids and liquids can also be used. A useful transmission medium for electromagnetic waves like light and radio waves is vacuum or air.

Although a physical substance is not necessary for the propagation of electromagnetic waves, these waves are typically impacted by the transmission medium they pass through, for example, by absorption, reflection, or refraction at the interfaces between media. Therefore, waves can be transmitted or guided using technical devices.

To know more about transmission medium click here:

brainly.com/question/28113920

#SPJ4

You might be interested in
Look at the following function prototype. double mynewFunction(int); What is the data type of the function’s return variable?
nadezda [96]
The answer is A) Double.

The return type is specified before the method's signature, and the signature is composed of the the method's name and parameters.

In this case, the method is named mynewFunction, takes in an integer as a parameter, and returns a double.

Also, fun fact which is kind of unrelated: if two or more methods have the same name, they can have different functionality as long as their signature is different (different parameter types).
3 0
3 years ago
What is the output of the following program?
Contact [7]

The question is poorly formatted:

<em>#include <stdio.h> </em>

<em>int main() { </em>

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em>arr [1] = 0; </em>

<em>arr [3] = 0; </em>

<em>for (int i = 0;i < 5; i+=1) </em>

<em>printf("%d", arr[i]); </em>

<em>return 0; </em>

<em>}</em>

Answer:

The output is 10305

Explanation:

I'll start my explanation from the third line

This line declares and initializes integer array arr of 5 integer values

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em />

This line sets the value of arr[1] to 0

<em>arr [1] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 4, 5};</em>

This line sets the value of arr[3] to 0

<em>arr [3] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 0, 5};</em>

<em />

The next two lines is an iteration;

The first line of the iteration iterates the value of i order from 0 to 4

<em>for (int i = 0;i < 5; i+=1) </em>

<em />

This line prints all elements of array arr from arr[0] to arr[4]

<em>printf("%d", arr[i]); </em>

<em />

<em>So, the output will be 10305</em>

3 0
3 years ago
1. True or false: The more pixels per inch in an image, the higher the resolution is. (1 point)
Annette [7]
1. true
2. pixel
3. raster images are built with pixels
4. false
5. image size
6. rollover
7. sharp with clear details
8. 78px
9. 24in
10. scalability
3 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
4 years ago
When pointed over a text within a paragraph, the cursor takes the shape of a/an
Crank
I type of shape, or a pointing index finger
5 0
3 years ago
Other questions:
  • EXPLAINING A URL
    15·1 answer
  • The _____ icon looks like a clipboard with a page of paper attached. Cut Copy Paste Clipboard
    5·1 answer
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • HELP 10 POINTS AND BRAINLIEST FOR BEST ANSWER! EASY I PROMISE! HELPFUL ANSWERS ONLY PLEASE HURRY!
    14·2 answers
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    5·1 answer
  • New Jersey and New York have the highest state taxes in the United States. They also have high ratios of people moving out compa
    13·1 answer
  • Complete the method, print Multiples(), that takes in a positive integer n, and another positive integer, max. Print out all the
    15·1 answer
  • When discussing the business requirements of a WLAN design, what is the first question that should be posed
    15·1 answer
  • How to deactivate the brainly account?​
    13·1 answer
  • How many bytes/second is a 16Mbps cable modem connection?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!