1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
9

Networks can be classified by geographical scope as PANs, , and WANs. The cables and signals used to transport data from one net

work device to another are a communication . Wired channels include twisted pair wires, cables used for cable television, and -optic cables used for high-capacity trunk lines. Wireless channels use signals and microwaves. Government agencies regulate some wireless . The transmission capacity of a channel is referred to as . Channels that are capable of moving at least 25 Mbps are classified as . Networks can be configured in various , such as star, mesh, point-to-point, or bus. Any device in a network is referred to as a(n) . Data equipment includes computers. Data equipment includes modems and routers. Additional DCEs include hubs, switches, bridges, repeaters, and access points. Networks use physical, transport, and arrival communication to set the rules for efficiently transmitting data and handling errors.
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

1. LANs.

2. Channel.

3. Coaxial; fiber

4. RF; Channels.

5. Bandwidth.

6. Broadband.

7. Topologies.

8. Node.

9. Terminal.

10. Communication.

11. WAP.

12. Protocols.

Explanation:

1. Networks can be classified by geographical scope as PANs, <u>LANs</u>, and WANs.

2. The cables and signals used to transport data from one network device to another are a communication <u>channel</u>.

3. Wired channels include twisted pair wires, <u>coaxial</u> cables used for cable television, and <u>fiber</u>-optic cables used for high-capacity trunk lines.

4. Wireless channels use <u>RF</u> signals and microwaves. Government agencies regulate some wireless <u>channels</u>.

5. The transmission capacity of a channel is referred to as <u>bandwidth</u>.

6. Channels that are capable of moving at least 25 Mbps are classified as <u>broadband</u>.

7. Networks can be configured in various <u>topologies</u>, such as star, mesh, point-to-point, or bus.

8. Any device in a network is referred to as a <u>node</u>.

9. Data <u>terminal</u> equipment includes computers.

10. Data <u>communication</u> equipment includes modems and routers.

11. Additional DCEs include hubs, switches, bridges, repeaters, and <u>WAP</u> access points.

12. Networks use physical, transport, and arrival communication <u>protocols</u> to set the rules for efficiently transmitting data and handling errors.

You might be interested in
Question2.<br> What are the functions of information technology?
vovangra [49]

Answer:

I) infrastructure

ii) communication

iii) introduces and maintains computerized systems to process data efficiency , etc

3 0
2 years ago
Alishia's employer has its corporate office on one side of their city, but its data
s2008m [1.1K]

Hey! I just did the test and your answer is MAN.

7 0
3 years ago
Which shortcut key combination will move the cursor to the beginning of the line?
Lina20 [59]

Answer:

Home Key

Explanation:

To move the cursor to the beginning of line:

Press `HOME` button on keyboard

5 0
3 years ago
I will give brainiest to the person that is right. What is change management?
Serggg [28]

Answer:

Umm I think it's A I am not sure tho

3 0
3 years ago
Given a UNIX file system with 1024-byte blocks, how many disk accesses are needed to access bytes 2500-2503 of a file (assume th
cestrela7 [59]

Answer:

(A) 1

Explanation:

In UNIX the file system the file system is a central part of the operating system. The file system is for storage and retrieval of information. Programs that form the UNIX system also stores information in files.

UNIX file systems supports three files namely: ordinary file, directory files, device files or special files.

If we need to access bytes 2500-2503 it means the bytes are within the third block. So we will need only one access.

Note this is because the file control block (inside) is within the memory. If file control block was not in the memory we would have needed more disk accessses.

7 0
3 years ago
Other questions:
  • The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
    13·1 answer
  • 1. when is it a good idea to use lossless compression
    8·1 answer
  • What is the advantage of video conferecing
    13·2 answers
  • What are the 3 examples of numeral systems
    5·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • How many sections of a job description are there
    5·1 answer
  • What's ur favorite color and your dream car
    8·2 answers
  • A pizza delivery restaurant decides to stop hiring drivers and start hiring cyclers to deliver its pizza. The restaurant thinks
    15·1 answer
  • FIFTY POINTS IF YOU CAN HELP ME!!!!
    11·1 answer
  • Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!