1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
3 years ago
15

To permit electrical energy to be sent over long distances at high voltage, then reduced to a lower voltage for everyday use, wh

at do transmission lines use?
Computers and Technology
2 answers:
AVprozaik [17]3 years ago
7 0
High-voltage direct current
Verizon [17]3 years ago
4 0

To permit electrical energy to be sent over long distances at high voltage, then reduced to a lower voltage for everyday use, what do transmission lines use?

alternating current

You might be interested in
What company or individual is responsible for developing the linux operating system?
Arisa [49]
The guy is Linus Torvalds.,
If this was helpful, please mark me as brainliest.
3 0
4 years ago
Where does Microsoft word put elements such as text logos or graphics saved for later use in a document
cupoosta [38]

We use Quick Part Gallery to create, preserve, and reuse

pieces of content like AutoText and fields. Quick parts is also referred to as

building blocks since they contain reusable blocks of content. MS Word helps

you recycle content in business documents by using building bloc

7 0
3 years ago
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
What is the program filename and extension of file explorer?
Klio2033 [76]

Explorer.exe is the program filename and extension of File Explorer.

To add, File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the filesystems.

4 0
3 years ago
If you are parked on an incline with a manual transmission vehicle and your vehicle is facing downhill, you should put your vehi
emmainna [20.7K]
If you're parked between cars, it's preferable to just leave it in neutral: this way, if somebody bumps you, it doesn't harm the transmission. Just make sure you've got the handbrake firmly set.

<span>If on a hill, 1st gear if facing uphill; reverse if facing downhill. Just make sure to set the parking brake </span>before<span> releasing the clutch, so that the weight of the car is on the brake first; the gear is there only as a backup should the brake fail.</span>
4 0
3 years ago
Other questions:
  • Write a program named TypingGrades that allows a user to enter a student’s number of words typed. The output is the letter grade
    9·1 answer
  • Do clocks have cell's?
    15·2 answers
  • While working with style formatting for a Microsoft Word document, when you change the text or paragraph formatting of a single
    13·1 answer
  • Which of these tax forms reports an employee's yearly social security tax withheld
    11·2 answers
  • What is Identity Theft?
    8·1 answer
  • A customer in a store is purchasing five items. Write a program that asks for the price of each item, and then displays the subt
    8·1 answer
  • Sub to splashy
    14·2 answers
  • What information is contained in the title bar
    13·1 answer
  • Https://www.canva.com/design/DAEdipB8WJ4/etwBH9c1cMBNIaThAaOUqg/view?utm_content=DAEdipB8WJ4&amp;utm_campaign=designshare&amp;ut
    5·1 answer
  • What is the difference between cyberbullying and bullying.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!