<h2>Many properties can be listed out viz. durability, quality, the sound that it produces also depends on the material that is used, etc.</h2>
Explanation:
1. If you take wood then I would say maple, rosewood, cedar, walnut can be used to make "String instruments".
Reason:
The wood that we choose should be perfect and should give long-life to use the instrument.
2. If we consider about strings, then I would suggest that the material that you choose should be "ductile and hard".
Reason:
Thin wires can be drawn.
3. In case of Brass, it should be "malleable metal", so that the outcome of the instrument will satisfy the need.
Answer:
Subject
Explanation:
The kind of word that is pronoun in bold letters is "Subject".
In Example
We get our paychecks on Friday, and I always need mine.
There We and I are subjects.
Mobile phones transmit and receive signals using electromagnetic waves, that is, wireless signal are electromagnetic waves which can travel through a vacuum, they do not need a medium or matter.
<h3>What are electromagnetic waves?</h3>
They are generated by electrical and magnetic particles moving at the same time (oscillating).
<h3>Characteristics of electromagnetic waves</h3>
- Network waves are electromagnetic waves.
- A mobile phone has coverage when it receives electromagnetic waves from at least one base station.
- They do not necessarily require a material medium for their propagation.
Therefore, we can conclude that electromagnetic waves are those that do not need a material medium to propagate and include, among others, radio, television and telephone waves.
Learn more about electromagnetic waves here: brainly.com/question/13803241
The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.
<h3>What are the cybersecurity?</h3>
Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.
Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.
Read more about the cybersecurity technologies:
brainly.com/question/26260220
#SPJ1