1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
4 years ago
9

Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form

is called _____________.
?Telecom Engineering
?Computer Engineering
?Computer Science
?Information
Computers and Technology
1 answer:
lorasvet [3.4K]4 years ago
6 0

Answer: Telecom engineering

Explanation:

As, the telecom engineering is the process of capturing, processing and transmission of information in the digital form. Basically, it is responsible for transmission of data by converting the analog signal into the digital form by using various optical fiber tools and electronic service system. It is the type electronic data exchanger by which information is transmitted by using cables or wires.

You might be interested in
How do i add an answer on brainly i click to add an answer and it sends me to the home page
cricket20 [7]

Answer:  try to just add as little as possible then add the answser or just reload your browser

Explanation:

7 0
3 years ago
What RAID level is a stripe set with distributed parity? This RAID level is implemented in Windows Server 2012 R2?
umka21 [38]

Answer:

The correct answer to the following question will be "RAID 5".

Explanation:

  • RAID 5 is an obsolete array of the setup of independent disks that uses parity disk striping. RAID 5 classes have a total of three and no full hard drives (HDDs).
  • RAID 5 is considered to be among the most stable RAID systems because the stability data is scattered throughout all drives.
  • In a RAID 5 package, the minimum amount of disks is three (two for records, and one for variance). The maximum amount of disks in a RAID 5 system is infinite in principle even though your disk array may have created-in limitations. RAID 5 however only defends against a single failure of the motor.

Therefore, this will be the right answer.

6 0
3 years ago
A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. For example, 19 yields
posledela

Answer:

The correct program to this question as follows:

Program:

//header file

#include <stdio.h> //include header file for using basic function

int main() //defining main method

{

int amountToChange=19,numFives,numOnes; //defining variable

numFives = amountToChange/5; //holding Quotient  

numOnes = amountToChange%5; //holding Remainder

printf("numFives: %d\n", numFives); //print value

printf("numOnes: %d\n", numOnes); //print value

return 0;

}

Output:

numFives: 3  

numOnes: 4  

Explanation:

In the above program first, a header file is included then the main method is declared inside the main method three integer variable is defined that are "amountToChange, numFives, and numOnes", in which amountToChange variable a value that is "19" is assigned.

  • Then we use the numFives and the numOnes variable that is used to calculate the number of 5 and 1 , that is available in the amountToChange variable.
  • To check this condition we use (/ and %) operators the / operator is used to hold Quotient value and the % is used to hold Remainder values and after calculation prints its value.

6 0
3 years ago
Consider an entity set Person, with attributes social security number (ssn), name, nickname, address, and date of birth(dob). As
lisov135 [29]

Answer:

\pi

Explanation:

4 0
3 years ago
You are working on a project and need to be able to access the content from home and share the files with other team members. Th
inn [45]
Local server so you can all you use if you guys are near
5 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • What is the name of a popular high-level computer programming and scripting language that is the name of a snake?
    10·1 answer
  • which quotation from the story of the fisherman in the Arabian nights' entertainments supports the theme that cleverness trumps
    15·1 answer
  • The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
    13·1 answer
  • What are some differences between film and digital cameras?
    8·1 answer
  • HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
    11·1 answer
  • How do you turn a .bat file into a .exe file, running the same code? I want to publish something on the internet without everyon
    10·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • The design of a blog refers to:
    8·1 answer
  • (main.c File)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!