1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
4 years ago
11

How can a cell phone tower help people​

Computers and Technology
2 answers:
il63 [147K]4 years ago
7 0
It has long range. So yeah
Sveta_85 [38]4 years ago
6 0

Answer:

Whenever you use your mobile phone to make a call, it emits electromagnetic radio waves also known as radio frequency or RF energy. Once the radio waves are emitted, the antenna from the nearest cell phone tower will receive them. The antennas of a cell tower can both transmit and receive signals from mobile phones.

You might be interested in
Which are examples of embedded systems? Choose two answers.
SVEN [57.7K]

Answer:

An operating system inside a virtual machine

Smart TVs

Explanation:

We can explain an embedded systems like a system within other system, in this case we have two examples, the smart TV have an operative system in some cases an Android system, and this system is within the television system, the virtual machine is the same concept, we can have an Android system running in a windows system.

7 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
oee [108]

Answer:

The result of combining the both tables is:

Employee(EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

Since the EmployeeNum is the primary and it is available in both tables, what happens is that, it will not list the primary key column twice. It will list the primary key first then all the other attribute in the first table followed by the attribute in the second table. And it will take note so as not to repeat attribute that already occur in the first table.

For instance; in this case, besides EmployeeNum, LastName and FirstName also appear in the both tables but only one instance of them were listed in the resulting table.

4 0
3 years ago
Pedestrians, cyclists, horse drawn vehicles and wheel chair users are known as ___________
Anton [14]
Hi, the answer you are seeking is A. Vulnerable Road Users.

Take care,
Diana
6 0
3 years ago
Read 2 more answers
The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.
ICE Princess25 [194]

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

5 0
3 years ago
What term describes a wireless network topology in which access points work as peer devices on the same network?
kumpel [21]
Mesh WLAN wireless mesh network WMN describes a wireless network topology in  access points work as peer devices on the same network.
<span />
7 0
3 years ago
Other questions:
  • In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment
    5·1 answer
  • Some drugs, like Tylenol, are available over the counter because they are safe in any dose.
    8·1 answer
  • Which of these IP addresses is not a valid address? a. 199.199.3.3 b. 192.168.258.4 c. 192.168.0.9 d. 10.10.10.40
    13·1 answer
  • Assume v is a vector of integers that has been declared and initialized. Write a statement that adds the value 42 to the vector.
    14·1 answer
  • Server 2016 is compatible for Powershell 5.0 State True or False.
    7·1 answer
  • Who could be involved in the murder of Mr Douglas​
    6·2 answers
  • The early success of Microsoft was cemented by the release of which software product:
    12·1 answer
  • Your mother wants to purchase a large hard drive for her computer and asks you to see what type of drive interface she has. Her
    13·1 answer
  • Why is the technology so effective in tracking contacts
    7·1 answer
  • can you follow my ikok? its that_enby_skye and my youube Cactus Face with 241 subscribe er s &amp; my twith Mx_Skye
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!