1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
15

Which type of transmission do modems use ?

Computers and Technology
2 answers:
miv72 [106K]3 years ago
8 0
Asyncronous (from the research I've done)
horsena [70]3 years ago
6 0
Asyncronous is the answer I think
You might be interested in
What key is used to create spaces between lines within a document?
Naily [24]

I guess the correct answer is the Enter key

Οn cοmputеr kеybοards, thе еntеr kеy in mοst casеs causеs a cοmmand linе, windοw fοrm, οr dialοg bοx tο οpеratе its dеfault functiοn. This is typically tο finish an "еntry" and bеgin thе dеsirеd prοcеss, and is usually an altеrnativе tο prеssing an ΟK buttοn.

4 0
4 years ago
A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
baherus [9]

Answer:

A Port Replicators.

Explanation:

Port replicators are devices or extension. They are plugged into the laptop's usb port to provide extra ports to connect other external devices needed by the laptop.

Docking stations does the same thing, but the laptop is plugged into the docking station holding the needed devices, and meant for that laptop brand.

7 0
3 years ago
1.5 question 3 on edhesieve
morpeh [17]

Answer:

ppl

Explanation:

asfafgdffsghsdfghdgsghdfghtrbd54445 ddfgg

7 0
3 years ago
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
How do you mark brainliest on here?<br> 15 points
san4es73 [151]

HIT ADD BRAINLIEST IF YOU DO THAT ITLL WORK WELL


4 0
4 years ago
Read 2 more answers
Other questions:
  • What is something you can do to stay connected to the relationships in your life while we spend this time at home?
    13·1 answer
  • What is a common source of connection problems with ethernets?
    9·2 answers
  • Given a integer, convert to String, using String Builder class. No error checking needed on input integer, However do read in th
    11·1 answer
  • .Ashley is creating a new logo for her client that should be a vector graphic. Which is classified as a vector editing software?
    8·1 answer
  • How many report charts can be added to the account page layout to meet this requirement? A sales manager would like to look at a
    14·1 answer
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • Which of the following would be least effective?
    10·1 answer
  • Consider the following code segment.
    5·1 answer
  • What Windows utility can enable you to shut down an unresponsive application?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!