1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
15

Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.

Computers and Technology
2 answers:
dlinn [17]3 years ago
6 0

Answer:

i think digital signals

Explanation:

A digital signal is a signal that is being used to represent data as a sequence of discrete values; at any given time it can only take on one of a finite number of values.[1][2][3] This contrasts with an analog signal, which represents continuous values; at any given time it represents a real number within a continuous range of values.

iren [92.7K]3 years ago
5 0

Answer: A) Digital signals

Explanation:

  • Digital signal is a signal that helps in describing about the data in sequential manner in form discrete bands or binary values.
  • The electrical signal containing data is converted into bits that can be represented through two digital values i.e. 0s and 1s.
  • Other options are incorrect because contiguous signal is regular adjacent signal. Ramp signal is represented as increment in magnitude with time
  • Exponential signal is based on sine and cosine signal that is two real time signal.
  • Thus, the correct option is option(A).

You might be interested in
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
Which technology do online storesusually use to present customized content?
k0ka [10]

Answer:

real time analytics technology

Explanation:

Online stores usually use real-time analytics technology to present customized content. Explanation: Real-time analytics is gaining popularity nowadays. It is basically the procedure of measuring and preparing the data as it enters the database

8 0
3 years ago
In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interacti
Neko [114]

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

3 0
3 years ago
If (accountBalance &lt; 1000.00):
andreyandreev [35.5K]

Answer:

See explanation

Explanation:

Given

The code segment

Required

The output

The code segment is incomplete, as the value of accountBalance is not given.

However, I will explain the given segment using few illustrations.

The following will be executed if accountBalance is less than 1000.00

<em>if (accountBalance < 1000.00): </em>

<em>    print(“SAVINGS3”)</em>

Take for instance:

accountBalance = 500.0; "SAVINGS3" will be printed

The following will be executed if accountBalance is less than 2000.00 but more than or equal to 1000.00

<em>elif (accountBalance < 2000.00): </em>

<em>    print(“SAVINGS2”)  </em>

Take for instance:

accountBalance = 1500.0; "SAVINGS2" will be printed

The following will be executed if accountBalance is less than 3000.00 but more than or equal to 2000.00

<em>elif (accountBalance < 3000.00): </em>

<em>     print(“SAVINGS1”) </em>

Take for instance:

accountBalance = 2500.0; "SAVINGS3" will be printed

Lastly, if accountBalance is 3000.00 or greater, the following will be executed

<em>else: </em>

<em>    print(“SAVINGS”)</em>

Take for instance:

accountBalance = 3500.0; "SAVINGS" will be printed

7 0
3 years ago
How is Storm chasing technology advanced? How is it becoming more advanced?
zhuklara [117]
Storm chasing has become more advanced because of the new technology created. One helpful tool is weather ballons. These ballons can track change in the atmosphere and can help predict tornadoes. Another form of useful technology is the cars now used. The new cars used have a ton of new updates, such as drills that can go into the ground, better radios, and the truck is now much heavier. Overall form chasing has become much more advanced and safer
7 0
3 years ago
Other questions:
  • Num = int(input("Enter a number: "))
    5·2 answers
  • Why is it difficult to enforce laws against intellectual theft?
    10·1 answer
  • How do you change your password on this? This isn’t really a “Question” but....
    10·2 answers
  • Define a JavaScript function named showGrades which does not have any parameters. Your function should create and return an arra
    5·1 answer
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • Your reputation and credibility will be immediately destroyed if your website contains?
    8·2 answers
  • A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
    11·1 answer
  • How do you suppose a request travels from one computer to another? How does the request know where to go?
    8·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • What is the function of a bread crumb trial in a website
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!