1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
2 years ago
15

When data can flow across a cable in both directions, this is known as___Communicating?

Computers and Technology
1 answer:
Ede4ka [16]2 years ago
3 0

Answer:

full duplex communication.

Explanation:

In a duplex type of topology or communication, data or information can be transferred in both directions.

There are two different types of these communications

You might be interested in
What is the python ?​
docker41 [41]

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

3 0
2 years ago
Read 2 more answers
Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the r
Triss [41]

Answer:

Data bar

Explanation:

8 0
3 years ago
What the heck is happening what is this?
Brilliant_brown [7]
Just decrease the font size and the size of the like will decrease.

Decrease font size by pressing on the part were it says 29 and typing in a smaller number like 14 for example
4 0
3 years ago
The trust relationship between the primary domain and the trusted domain failed. what does this phrase mean?
jeka57 [31]

Answer:

It's an error message

Explanation:

This error indicates that this computer in no longer trusted and diconnected from the Active Directory since the local computer password doesn’t match this computer object password stored in the AD database. Trust relationship may fail if the computer tries to authenticate on a domain with an invalid password. Typically, this occurs after reinstalling Windows.

A system trusted by a user, is one that the user feels safe to use, and trusts to do tasks without secretly executing harmful or unauthorised programs; while trusted computing refers to whether programs can trust the platform to be unmodified from that expected, whether or not those programs are innocent, malicious or otherwise.

4 0
2 years ago
I play Among us :) hbu
11Alexandr11 [23.1K]

Answer:nice

Explanation:u tryna play doe?

7 0
3 years ago
Read 2 more answers
Other questions:
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • Performance problems in a computer system are usually due to ____ problems.
    11·1 answer
  • What are the basic tools for coding HTML manually?
    10·2 answers
  • The exercise instructions here are LONG -- please read them all carefully. If you see an internal scrollbar to the right of thes
    12·1 answer
  • Create a stored procedure sp_Q1 that takes two country names like 'Japan' or 'USA'as two inputs and returns two independent sets
    10·1 answer
  • Is this a Bad Cpu processor ? I need some.help ASAP I turn on my.pc and it has no display but everything is on fans and the you
    13·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • Which activity is the best example of a negative habit that may result from
    12·1 answer
  • Edhesive 4.3 code practice question 2
    14·1 answer
  • What is the future of web development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!