1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
1 year ago
11

Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.

Computers and Technology
1 answer:
mina [271]1 year ago
8 0

Twisted copper telephone wire, coaxial copper cable, fiber-optical cable, and media for wireless transmission are all physical transmission medium.

A system or material that can mediate the propagation of signals for telecommunications purposes is referred to as a transmission medium. Typically, signals are applied to a wave of some sort that is appropriate for the selected medium.

For instance, data may modulate sound, and while air is a common transmission channel for sounds, solids and liquids can also be used. A useful transmission medium for electromagnetic waves like light and radio waves is vacuum or air.

Although a physical substance is not necessary for the propagation of electromagnetic waves, these waves are typically impacted by the transmission medium they pass through, for example, by absorption, reflection, or refraction at the interfaces between media. Therefore, waves can be transmitted or guided using technical devices.

To know more about transmission medium click here:

brainly.com/question/28113920

#SPJ4

You might be interested in
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
2 years ago
What is the name for the individual sections of the ribbon in PowerPoint 20162
Julli [10]

Answer:

Tabs

Explanation:

The ribbon contains the tabs. The tabs contain the command groups which hold commands

IF THIS HELPS PLEASE MARK THIS ANSWER AS BRAINLIEST

6 0
3 years ago
To make a complicated task easier, use a _____.
tia_tia [17]
I believe the answer is B spread sheet because i use spread sheets to make my life easier. I organize info in a spread sheet then it is really easy to find.

hope this helps<span />
6 0
2 years ago
A(n) guiiconfatmenu is a list of commands that tell your computer what to do.
natima [27]
Yes that is right a guiiconfatmenu is a list of commands that your computer will tell you to do
3 0
3 years ago
Read 2 more answers
Choose the list of the best uses for word processing software.
Marina86 [1]
List, resumes, spread sheet, databases, contracts
4 0
3 years ago
Other questions:
  • In 1-2 paragraphs discuss the three main purposes of design and provide examples for each. Also explain how a design might serve
    15·1 answer
  • Which key you should you press to leave the cell as it orginally was
    14·2 answers
  • Give me 3 facts and 3 opinions
    5·1 answer
  • 16. Which of the following wire gage sizes is the thickest? A. 14 B. 8 C. 0 D. -33
    14·1 answer
  • Create a program that asks the user to enter grade scores. Use a loop to request each score and add it to a total. Continue acce
    9·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • I don't get the width and height part (PLEASE HELP WILL GIVE BRAINLIEST ANSWER)
    12·1 answer
  • Types of Hazards Mitigation Measures
    8·2 answers
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!