1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
3 years ago
15

Which technology uses regular phone lines and transmits at speeds up to 256 kbps?

Computers and Technology
2 answers:
MAVERICK [17]3 years ago
5 0
Broadband refers to a high-speed Internet transmission (usually 256Kbps and above) featuring a permanent connection. The most common ways of getting online with broadband are via your TV cable box, your satellite or via your phone line. Cable TV is an easy option, but the most common type of broadband access is through an upgraded home telephone line called ADSL (Asymmetrical Digital Subscriber Line). ADSL is always connected so needn't be dialed up each time, and you can make phone calls on the same line while it's being used.
astra-53 [7]3 years ago
3 0
I am completely sure that technology which uses regular phone lines and transmits at speeds up to 256 kbps is called Integrated Services Digital Networks or ISDN which are faster than dial up connection and allows to use a telephone line simultaneously. It's the first fixed broadband wireless connection 
You might be interested in
Imagine you're developing a Pokemon game, and you need to implement the battle party mechanic. Recall that the player's party ca
valina [46]

Answer:

Complete code is given below and output is also attached.

Explanation:

import java.util.ArrayList;

import java.util.HashMap;

import java.util.Iterator;

import java.util.Map;

import java.util.Set;

public class Test {

  public static void main(String[] args) {

      String [] names = {"Pikachu", "Venuasur", "Charizard", "Blastoise", "Lapras", "Sonarlax"};

      int[] levels = {88, 84, 84, 84, 80, 82};

     

      ArrayList<HashMap<String, Integer>> party = createParty(names, levels);

     

      //looping through the list

      for(HashMap<String, Integer> i: party) {

         

          Set set = i.entrySet();

          Iterator itr = set.iterator();

          //showing output

          while(itr.hasNext()) {

              Map.Entry mentry = (Map.Entry)itr.next();

              System.out.println(mentry.getKey()+" "+mentry.getValue());

          }

      }

  }

  private static ArrayList<HashMap<String, Integer>> createParty(String[] names, int[] levels) {

      ArrayList<HashMap<String, Integer>> party = new ArrayList<>();

     

      for(int i=0; i<names.length; i++) {

          //creating new hashmap

          HashMap<String, Integer> pokemon = new HashMap<>();

          pokemon.put(names[i], levels[i]);//adding pokemon

          party.add(pokemon);//adding it to the list

      }

     

      return party;

  }

}

4 0
4 years ago
What is the potential outcome for an author if she uses a word without realizing its connotation? she may write something that s
zubka84 [21]

A potential outcome for an author who uses a word without realizing its connotation is: A. she may write something that she does not mean.

<h3>What is connotation?</h3>

Connotation refers to the quality, feeling or an idea which a word brings to the mind of a reader or listener, as well as its literal, dictionary or primary meaning.

This ultimately implies that, a potential outcome for an author who uses a word without realizing its connotation is that he or she may write something that she does not mean or pass across an information she didn't intend to.

Read more on connotation here: brainly.com/question/20236939

#SPJ1

3 0
2 years ago
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
3 years ago
Which of the following job tities is held by a person working at a global food distribution ?
Ksivusya [100]
Hi! Please give me Brainliest! Thanks!
6 0
3 years ago
Fill in the blank to make the following true.<br> 2 ** 3 =
avanturin [10]

Answer:

2 ** 3 = 8

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the
    13·1 answer
  • Charts are inserted into an excel spreadsheet using the commands in the charts group on the ____ tab on the ribbon.
    13·1 answer
  • is a shell program in Windows that holds individual utilities called snap-ins, designed for administration and troubleshooting.
    11·1 answer
  • Why Do You Need to Set Goals for a LinkedIn Automation Campaign?
    15·1 answer
  • Please help it would mean a lot.
    7·2 answers
  • Describe what a Bank Run is.
    10·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
  • The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
    6·1 answer
  • Answer pls pls pls pls ​
    13·1 answer
  • Which of the following shows how to correctly declare pointer variable x?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!