1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
11

BRAINLIEST plz help

Computers and Technology
1 answer:
avanturin [10]3 years ago
8 0

Answer:C

Explanation:

You might be interested in
Smith, Smith, Smith, and Smith (S4) is a regional accounting firm will be moving to a new four-story building. There will two Lo
ICE Princess25 [194]

Answer:

Crosstalk, Jitter, Impulse noise.

Explanation:

Crosstalk is a network error that occurs when one pair of cable causes interference on another pair of cables thereby preventing efficient data transmission.

Jitter may also impair the accuracy of the data being transmitted across network because minute variations in amplitude, phase, and frequency always occur. The generation of a perfect carrier signal in an analog circuit is almost impossible. The signal may be affected by continuous and rapid network gains or phase changes.

Impulse noise (also referred to as spikes) is the primary source of errors in data communications.  Impulse noise can be caused by positioning a communications cable near a source of intermittent but strong electromagnetic pulses, such as an elevator motor.

Counter measures

Shielding (protecting wires by covering them with an insulating coating) is one of the best ways to prevent impulse noise, cross-talk.

Amplifiers can be used to increase signal strength since the connection would run across 4 floors.

5 0
3 years ago
Allocate 100 integers and assign the resulting pointers to the elements of ip_arr. Initialize each integer value to -1.
dmitriy555 [2]

Answer:

#include <iostream>

using namespace std;

int main() {

   int *ip_arr,n;//pointer name inp_arr and integer n to store the size.

   cin>>n;//size.

   for(int  i=0;i<n;i++)

   ip_arr[i]=-1;//assigning -1 to every element.

  for(int i=0;i<n;i++)

  {

       cout<<ip_arr[i]<<" ";//printing every element.

  }

return 0;

}

output:-

100

-1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1 -1  

Explanation:

I am taking input of size.You should enter 100 for 100 values which have value -1.

5 0
3 years ago
I am in school what should i do i am 15
MaRussiya [10]

Answer:

your work?

Explanation:

7 0
2 years ago
Read 2 more answers
in speech writing, it can be defined as all aspect of your writing that help the reader move smoothly from one sentence to the n
serious [3.7K]

Answer:

Logical flow

Explanation:

In speech writing, LOGICAL FLOW can be defined as all aspects of your writing that helps the reader move smoothly from one sentence to the next, and from one paragraph to another.

With the Logical flow, one will be able to guide his thoughts coherently and sequentially in which Readers can fully absorb and easily understand the message.

5 0
2 years ago
How is a technical certificate like a computer-related associate degree?
satela [25.4K]

Technical certificate like a computer-related associate degree because They both provide evidence for specialized training.

<h3>What is technical certification?</h3>

Technical certifications is known to be made up of all the coursework and testing that gives one the right to claim mastery of a specific technical skill set.

Hence, Technical certificate like a computer-related associate degree because They both provide evidence for specialized training as one do need a degree to practice it.

Learn more about Technical certificate from

brainly.com/question/24931496

#SPJ1

4 0
2 years ago
Other questions:
  • Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
    14·1 answer
  • A Narrative Statement illustrates how your life will look when you reach a goal.
    15·2 answers
  • Differentiate between third and fourth generation of computer​
    6·1 answer
  • An iPad Is An Example Of Which Type Of Computer?
    11·2 answers
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • Assume that LO and HI have already been assigned as constants with LO &lt; HI, and x has been declared as DWORD in the data segm
    7·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • outline 4 IDE features that makes software development much faster and more convenient than other alternatives.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!