1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
1 year ago
11

Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.

Computers and Technology
1 answer:
mina [271]1 year ago
8 0

Twisted copper telephone wire, coaxial copper cable, fiber-optical cable, and media for wireless transmission are all physical transmission medium.

A system or material that can mediate the propagation of signals for telecommunications purposes is referred to as a transmission medium. Typically, signals are applied to a wave of some sort that is appropriate for the selected medium.

For instance, data may modulate sound, and while air is a common transmission channel for sounds, solids and liquids can also be used. A useful transmission medium for electromagnetic waves like light and radio waves is vacuum or air.

Although a physical substance is not necessary for the propagation of electromagnetic waves, these waves are typically impacted by the transmission medium they pass through, for example, by absorption, reflection, or refraction at the interfaces between media. Therefore, waves can be transmitted or guided using technical devices.

To know more about transmission medium click here:

brainly.com/question/28113920

#SPJ4

You might be interested in
To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
qwelly [4]

The type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI) is called: LDIF files.

<h3>What is OpenLDAP?</h3>

OpenLDAP can be defined as a free, open-source version of the Lightweight Directory Access Protocol (LDAP) that was developed in 1993 by the OpenLDAP Project.

Basically, it is the server software implementation of the Lightweight Directory Access Protocol (LDAP).

<h3>The uses of OpenLDAP.</h3>
  • It is used for LDAP database control.
  • It allow end users to browse, create, remove and change data on a LDAP server.
  • It allows end users to manage their passwords and browse through data schema.

In conclusion, LDAP Data Interchange Format (LDIF) file is a type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI).

Read more on LDAP here: brainly.com/question/25998402

7 0
2 years ago
Which of the following questions will most likely be answered by displaying data on a line graph?
Artemon [7]
I'm pretty sure the answer is b
4 0
3 years ago
Angular where to set httpclient root url.
Trava [24]

Answer:

start with what you know

Explanation:

you can learn a lot more

8 0
2 years ago
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
9 months ago
WILL MARK BRAINLIEST AND 20 POINTS
Fantom [35]
With templates, you can Create a new document based on previous formatting, create a custom template for future use, and apply different templates to different pages of a document.
4 0
3 years ago
Other questions:
  • You are attempting to gather information about a client's network, and are surveying a company site. Access is gained via secure
    8·1 answer
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
    12·1 answer
  • Which of the following is not an element of the modified block style?
    7·2 answers
  • What is company NDR?​
    11·1 answer
  • What is the term used when a password is obtained through tricking a user into giving it to another party?
    15·1 answer
  • The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a
    5·1 answer
  • Discussion Topic
    8·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!