1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
11

Using __, when a device transmits a binary 0, a zero voltage is transmitted. when the device transmits a binary 1, either a posi

tive voltage or a negative voltage is transmitted.
a. manchester
b. nrz-l
c. bipolar-ami
d. differential manchester
Computers and Technology
1 answer:
Ann [662]3 years ago
5 0
<span>Using bipolar AMI encodin scheme, when a device transmits a binary 0, a zero voltage is transmitted. When the device transmits a binary 1, either a positive voltage or a negative voltage is transmitted. Correct answer:C
</span><span>Bipolar - AMI encoding scheme is unique encoding scheme, because has three voltage levels.</span>
You might be interested in
The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
mote1985 [20]

The program is correct: at the beginning, product = 0. Then, we start summing Y to that variable, and we sum Y exactly X times, because with each iteration we increase Count by 1, and check if Count=X so that we can exit the loop.

5 0
4 years ago
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
The size of an array (how many elements it contains), which is accessed by .Lenth() returns (Choose the best answer)
Wewaii [24]

Answer:that creates the array, puts some values in it, and displays the values. ... assign a value to each array element and print for (int i = 0; i < anArray.length; i++) ... Array; Array Initializers; Accessing an Array Element; Getting the Size of an Array ... not create an array and does not allocate any memory to contain array elements.

Explanation:

5 0
3 years ago
Does any of yall know how to delete your account?
il63 [147K]

Answer:

No i really don't but why would you want to delete your account

8 0
3 years ago
*****HELP******
trasher [3.6K]

Answer:

True

Explanation:

The Most Favored Nation (MFN) status and national treatment are provided for in article 4 of the Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement and it is stated that when a member grants favor, advantage, immunity , or privilege to citizens of a country, the country shall grant similar favor, privileges and advantages to the citizens of the other members

Therefore;

<em>True</em> Most Favored Nation (MFN) status and national treatment are also included in the Agreement on Trade-Related Aspects of intellectual Property Rights (TRIPS).

5 0
3 years ago
Other questions:
  • All the processing-of work-done on a computer is performed by the what?
    11·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • A film camera with only one lens is known as a(n)?
    11·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • The physical elements needed for the production of digital media, such as computers, servers, and so on are called the {Blank}
    8·1 answer
  • Fill in the blank with the correct response.
    5·2 answers
  • What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 3 1 4 2
    14·2 answers
  • Will give brainliest
    8·1 answer
  • Create One print command in LOGO​
    12·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!