1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
7

What does wireless technology use to transmit signals?

Computers and Technology
1 answer:
MA_775_DIABLO [31]4 years ago
6 0
Radio waves hope this helped :)
You might be interested in
A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
Over [174]

Answer:

c) 2^32 times as many values can be represented.

Explanation:

It's funny, this problem comes from a real-life situation, except it wasn't really foreseen :-)  And we will encounter a similar problem in less than 20 years.

The difference in terms of storage capacity from 32-bit integers and 64-bits integers is huge.

A 32-bit integer can store (signed) numbers up to 2,147,483,647. (so over 2 BILLIONS)

A 64-bit integer can store (signed) numbers up to 9,223,372,036,854,775,807 (9 BILLIONS of BILLONS)

5 0
3 years ago
Read 2 more answers
Joann wants to save the building block she created for the title of her company.
konstantin123 [22]

Answer:

HTML BUILDING BLOCKS

Explanation:

4 0
3 years ago
Read 2 more answers
When a formula includes a cell reference, Excel interprets that cell reference as being located relative to the position of the
blagie [28]

Answer:

True

Explanation:

Cell reference or cell address is defined as a union of a column letter and a row number that recognize a cell on a worksheet.

5 0
3 years ago
To track what level a player is on, you can create a simple variable and a block saying change level by 1 attached to the when g
marishachu [46]

Answer:

False

Explanation:

I did it on edgnuity also i got it right

5 0
3 years ago
If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originate
suter [353]
<span>The answer is IP address.  If you experience a denial-of-service attack, you can use firewall logs to determine the IP address from which the attack originated.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • 5. How do vector graphics used with CRT technology work? List at least one of vector graphics’ advantages over raster graphics,
    9·1 answer
  • Briefly explain the benefits and consequences of technology. //PLEASE ANSWER//
    9·1 answer
  • Assume that an array named salarySteps whose elements are of type int and that has exactly five elements has already been declar
    11·1 answer
  • PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the childr
    13·2 answers
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • It is the ornamentation of textiles and other material with needle work
    7·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes
    12·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • your manager has asked you to implement a network infrastructure that will accommodate failed connections. which of the followin
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!