1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
9

Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training pro

gram? How do you believe you will use digital media in your life?
You will include: a concept map showing your future uses for digital media (at least five) an explanation of each use a description of the use
Computers and Technology
1 answer:
VikaD [51]3 years ago
7 0
Digital life is here to stay. The internet is use every single second of the day. We need our digital life today because during a pandemic we need online services such as for school and emergency services. We will always use the internet every day for the rest of our life.
You might be interested in
Using encryption, a sender can encrypt a message by translating it to which of the following?
Mila [183]

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

  • Option 'a' refers to the public key which is used to encrypt the data.
  • Option b refers to the private key which is also used for encryption.
  • Option d refers to the sniffer which is not the correct answer.

5 0
3 years ago
A mobile base station (BS) in an urban environment has a power measurement of 15 µW at 175 m. If the propagation follows an inve
PIT_PIT [208]

Answer:

The reasonable power will be "0.234 μW".

Explanation:

The given values are:

P = 15 μW

d = 175 m

As we know,

Propagation follows inverse cube power law, then

∴  Power \ \alpha \ \frac{1}{d^3}

⇒ Power=\frac{K}{d^3}

On substituting the estimated values, we get

⇒  15\times 10^{-6}=\frac{K}{(173)^3}

⇒  K=15\times (175)^3\times 10^{-6}

Now,

"P" at 0.7 km or 700 m from BS will be:

⇒  P=\frac{K}{d^3}

⇒  P=\frac{15\times (175)^3\times 10^{-6}}{(700)^3}

⇒  P=0.234 \ \mu W

6 0
3 years ago
How do you select from the insertion point to the beginning of the current line?
Neko [114]

Answer:

Press the Shift key, then press the Home key.

Explanation:

This is because Home key take you to a beginning of a line and shift selects.

Have a nice day!

Please mark as brainiest if this helped you! :)

4 0
3 years ago
Which of the following are parts of the Physical Layer?
Snowcat [4.5K]

Answer:

Physical layer is the first layer of OSI model.  The detail about physical layer and its parts is given below in explanation section.

Explanation:

The physical layer is the lowest and first layer of the Open Systems Interconnection Model (OSI). The physical layer is used for the transmission of data in bit forms. For transmission of data between devices, it uses the transmission medium that is either wired or wireless.

In the wired cable the component of the psychical layer include cable and connectors that are implemented for carrying data from one place to another or simply to transmit data between two connected devices. The wireless transmission medium is used to transmit data in the form of electromagnetic signals for carrying data into a stream of bits. Over past advancements in networking technologies, rapid growth has been seen in wireless data transmission and Wi-Fi and Bluetooth communication are few names of it.

Components/Parts of Psychical Layer

In the physical layer, the hardware components used it in are the network interface cards, connectors and interfaces, intermediate devices, modems, and cables to facilitate the transmission of data between devices or from source to destination.

  • The network interface card (NIC)

NIC is a component installed in the computer to connect it to any available devices over the network.

  • Connectors and Interfaces

Connectors and interfaces are used to connect cables that are being used for transmission of data from one source to another. The decision to choose connectors and interfaces depends on the type of cable. Typical examples are RJ-45, RJ-11, V.35, HDMI, etc.

  • Cables

Cables are the physical components of the physical layer that carry optic or electromagnetic signals for transmission of data from source to destination in the network.

  • Intermediate devices

The intermediate devices are hubs and repeaters etc. The functions of these devices are to amplify or generate the signal at the intermediate point in a network.

6 0
4 years ago
Robots can obtain data from the environment, store the data as knowledge, and modify their behavior
TiliK225 [7]
True robots that have integrated ML can store data in specialized arrays which can be processed by the algorithms to give the output as their behaviour.
5 0
4 years ago
Other questions:
  • William would like to sort a list of items after the data is already entered.
    9·1 answer
  • _____ learners prefer to interact with others on group projects.
    8·1 answer
  • A is the smallest unit of application data recognized bysystem software.
    12·1 answer
  • Is LTE faster than 4G?
    8·1 answer
  • Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
    12·1 answer
  • Q13. On which option do you click to
    12·1 answer
  • REM Its an exam program
    12·1 answer
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Write the simulate method, which simulates the frog attempting to hop in a straight line to a goal from the frog's starting posi
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!