1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
4 years ago
6

The major types of wireless media are______________.

Computers and Technology
1 answer:
zalisa [80]4 years ago
4 0

Answer:

C. Microwave, satellite, radio, and infrared.

Explanation:

Information technology is the use of advance technology to establish communication between devices. The communication of network devices in a network could be through a cable connection and/or wireless communication.

Wireless communication of devices uses electronic wave signals to transmit information. Cellular is a wireless cell phone communication used to connect and transmit data between cell and smartphones over long distances. Microwave and radio wave are electromagnetic waves that are transmitted and received by antennas built for it. The satellite is used to transfer data to long distance through line of sight to other satellite.

You might be interested in
A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to
RSB [31]

Answer:

The correct answer for the given question is "Computer virus"

Explanation:

A computer virus is a software program that is installed automatically without user's knowledge and designed to duplicate itself .The main purpose of computer virus is to harm the computer system.

Some of the points regarding computer virus

1.The computer virus contain malicious software Which harm the computer system.

2.It damage the  computer computer system in such away that sometimes users will unable to access some certain functionality of computer system.

5 0
3 years ago
What would you enter at the command prompt on a Linux system to display the IP addressesand the subnet masks assigned to each ne
noname [10]

Answer:

The ifconfig command.

Explanation:

A linux network system, like cisco networking devices, uses the linux operating system, in which it configuration differs from that of the cisco. It is very essential in network administration of have the basics in linux systems.

The network administrator uses the "ifconfig" command to display the IP addresses and subnet masks assigned to each network interface on a linux system.

5 0
3 years ago
-Give a definition of the critical section problem and explain the purpose of the entry and exit code blocks
Alisiya [41]

Answer: In operating system a code segment which accesses  some shared variables or resources one at a time atomically such other no other code or process is accessing that resource or variable at the same time.

Entry section code block allows the access to the shared resource or variable and exit section code signals the termination from access to the shared resource or variable.

Explanation:

Entry and exit section codes needs to check certain properties before allowing the access and removal of access to a particular code segment.

These conditions are:

1. Bounded waiting.

2. Mutual exclusion.

3. checking thread execution status to allows other threads to enter the critical section (CS).

6 0
3 years ago
What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how tha
GaryK [48]

Answer:

this is more of an opinion question regarding what you personally do

8 0
3 years ago
Read 2 more answers
Icons, arrows, shapes, and lines are considered what type of graphics?
monitta

Answer:

c I have took this test hefore

7 0
4 years ago
Other questions:
  • PLEASE HELP!!!!!!!!!!!
    11·2 answers
  • Laser printers are particularly effective for printing _______________.
    6·1 answer
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • When setting permissions on an object to Full Control, what otherpermissions does this encompass?Read, Write, Execute, and Modif
    13·1 answer
  • Most professional coding standards use _____ for class names. (Points : 2) underscores along with all upper case words
    15·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    6·1 answer
  • What does the format painter button do?
    13·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • NEED HELP IMMEDIATELY!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!