1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
6

What are the most common types of cables in a network?

Computers and Technology
1 answer:
Maru [420]3 years ago
4 0

the most common are twisted pair, coaxial, Ethernet cross over, and fiber optic.

You might be interested in
A.
FrozenT [24]

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

7 0
3 years ago
You have double-clicked a device in Device Manager to open its Properties window. Where can you find information about IRQs the
Setler [38]

To find information about IRQs the device might use, make alteration to the View menu option and then change it to Resources by type.

<h3>How do one find information about IRQs?</h3>

The best way to see IRQ information in Windows is through the use of Device Manager.

Note that for one to be able to find information about IRQs the device might use, one has to makes some changes to the View menu option and then one can change it to Resources by type to be able to see the Interrupt request (IRQ) part.

Learn more about Device Manager from

brainly.com/question/869693

#SJ1

7 0
2 years ago
Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
MariettaO [177]

Answer:

a. Report the new problem

Explanation:

Policies are an essential component of any organization and are important because they address pertinent issues.

Reporting the new problem would make it simpler for her and her colleagues who might encounter similar issues. It would also help the management to understand why it happened, assist her, set priorities and prevent recurrences.

3 0
4 years ago
k-means is a flat, partitioning clustering technique. how can k-means be used for hierarchical clustering?
Black_prince [1.1K]

K-means can be used for hierarchical clustering by creating a hierarchical tree structure. This is done by setting the number of clusters to be created, and then running the k-means clustering algorithm for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree. This process is repeated until the desired number of clusters has been created.

<h3>The Use of K-Means Clustering for Hierarchical Clustering</h3>

K-means clustering is a popular technique used in machine learning and data mining for partitioning data into clusters. It is a flat clustering algorithm, in which data points are grouped according to their similarity. While k-means clustering is suitable for partitioning data into a fixed number of clusters, it can also be used for hierarchical clustering. Hierarchical clustering is a clustering technique that creates a hierarchical tree structure, where each level of the tree is made up of clusters created by the k-means clustering algorithm.

The process of creating a hierarchical tree structure using k-means clustering is fairly straightforward. First, the number of clusters to be created is set, and then the k-means clustering algorithm is run for each level of the tree. For each level, the clusters created are then combined to form the next level of the tree until the desired number of clusters has been created. This process ensures that the clusters created are meaningful and have similar characteristics.

Learn more about k-means :

brainly.com/question/17241662

#SPJ4

3 0
2 years ago
What is the best description of a programming language?
sergejj [24]

Answer: A: A language that directs a computer to perform tasks and carry out

functions

Explanation: I'm a programmer, and coder, this is the best answer from the given choices

4 0
3 years ago
Other questions:
  • you want to search in your contacts in your email program. You enter the person's first name and last name in the search box. Yo
    8·1 answer
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • Write a program FindDuplicate.java that reads n integer arguments from the command line into an integer array of length n, where
    11·1 answer
  • in access, entering the search criteria "B?" would yield which of the following results? a. bentonville b. be c. brimingham d. b
    14·1 answer
  • The media literacy movement hopes to _____.
    15·2 answers
  • Assume each student is assigned an advisor from a department. Each classroom is assigned a classroom (class# determines Classroo
    14·1 answer
  • Create 3–5 questions about your data that can be answered by sorting and filtering the database.
    8·1 answer
  • Using the triple DES algorithm, which is the cipher text?
    8·1 answer
  • a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers
    7·1 answer
  • Write<br> algorithm to read 100 numbers<br> then display the largest.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!