1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
11

Which is a function of network media?

Computers and Technology
2 answers:
OLEGan [10]3 years ago
7 0
To distribute information and promote goods
Dennis_Churaev [7]3 years ago
6 0

Network media refers to the communication channels used to interconnect nodes on a computer network. Typical examples of network media include copper coaxial cable, copper twisted pair cables and optical fiber cables used in wired networks, and radio waves used in wireless data communications networks.

You might be interested in
A company produces coffee makers. The labor cost of assembling one coffee maker during the regular business hours is $2.65. If t
DochEvi [55]

Answer:

520

Explanation:

Let's say the x = smallest number of units that must be assembled during the regular hours, and 660-x is the number of units that can be assembled in overtime. Then, the total cost should be smaller than or equal to cost1 *x + cost2*3.75

⇒ (x * 2.65) + ((660 - x) * 3.75) <= 1903

⇒ x * (2.65 - 3.75) + (660 * 3.75) <= 1903

⇒ 1.1 * x >= 2475 - 1903

⇒ 1.1 * x >= 572

⇒ x >= 520

6 0
4 years ago
Answer is B because portrait is define that they take only photographs of people and like to communicate with people they are we
quester [9]
Ty ive been looking for that answer
5 0
3 years ago
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
⚠️JAVA⚠️<br> how did the output come like this ?
Morgarella [4.7K]
The first %d is the result of num 1 /bum 2
7 0
3 years ago
When workers demonstrate patience, are able to manage there emotions, and get along with other employees, which skills are being
LenKa [72]
The skill thar is being displayed I thing is being outgoing and loyal
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which is the last step in conducting a url research
    11·1 answer
  • ___________ is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or
    15·1 answer
  • 8. Seleccione la respuesta correcta de acuerdo con las opciones que aparece a continuación:
    11·1 answer
  • Discuss four ways you will use to reach all pupils who are living at a disadvantaged area.
    14·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • Dgvdsgf cvdzgb fgvsdxchygfdrzvdszfgvsdzxd
    9·1 answer
  • Which of these is a standard for describing a wifi network?
    14·1 answer
  • PLEASE HELP WITH KHAN ACADEMY WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
    11·1 answer
  • ________ is used to enter the results of a CBC into the computer system.pharmacy system.laboratory system.order entry/results re
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!