1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
6

In which way is a copper cable related to a wireless transmission

Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
4 0

Answer: whats the answer choices

Explanation:

You might be interested in
Once you have selected the range of cells for your table data, from which tab can you open the Insert Table dialog box?
Anuta_ua [19.1K]

A. Insert Tab. Specifically, The insert tab, then click "Table" which will open the Insert Table Dialog Box. Good luck!

3 0
4 years ago
Read 2 more answers
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
"during the ________ stage of system development, system specifications that were prepared during the design stage are translate
Paraphin [41]
The correct answer is programming
Hope this helps! :)
5 0
4 years ago
Write a method manyStrings that takes an ArrayList of Strings and an integer n as parameters and that replaces every String in t
raketka [301]

Answer:

public static ArrayList manyStrings(ArrayList<String> list, int n){

    ArrayList<String> newList = new ArrayList<String>();

    for (int i=0; i<list.size(); i++) {

        for (int j=0; j<n; j++) {

            newList.add(list.get(i));

        }

    }

    return newList;

}

Explanation:

Create a method called manyStrings that takes two parameters, list and n

Create a new ArrayList that will hold new values

Create a nested for loop. The outer loop iterates through the list. The inner loop adds the elements, n of this element, to the newList.

When the loops are done, return the newList

3 0
3 years ago
Which of the following is NOT shown on a PERT chart? (Points : 2) Scheduled start date
Reptile [31]

Answer:

Estimated Duration

Explanation:

A PERT Chart is a tool in Project Management that gives a graphical portrayal of an undertaking's timetable. The Program Evaluation Review Technique abbreviated as PERT separates the individual assignments of a venture for investigation.  

The most widely recognized components utilized in a PERT chart are:  

  • Span time.  
  • Activity
  • Early finish time.  
  • Early Ending time
  • Late initiation time.  
  • Late completion time.  
  • Critical path
  • Slack.  

It does not include the Estimated span of time.

4 0
3 years ago
Other questions:
  • Which tool is an easy way to navigate between rows of data in an Access table and is found in the status bar?
    9·1 answer
  • Which of the following are stages in the computer life cycle? Check all of the boxes that apply.
    13·2 answers
  • The BIOS feature that enables a hard drive to read or write several sectors at a time is called what?
    5·1 answer
  • A client is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The
    13·1 answer
  • A college meal plan allows students to:
    7·2 answers
  • Which LOOKUP function will you use if you want to search for a value in the columns?
    5·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    10·1 answer
  • Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
    10·1 answer
  • PLEASE HELP! 100 POINTS!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!