1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
11

Microwave transmits information between network nodes using

Computers and Technology
2 answers:
tekilochka [14]3 years ago
7 0

Answer:

Towers and satellite.

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

The distance from one peak to the next peak is called wavelength. This distance is also equal to the distance from one trough of a wave to another.

Also, microwave is a form of radio waves which typically has short wavelengths and frequency ranging from 300 MHz and 300 GHz.

Hence, microwave transmits information between network nodes using towers and satellite.

Cloud [144]3 years ago
7 0

Answer:

Towers and Satelite is the correct answer :D

You might be interested in
If your computer freezes on a regular basis and you checked your hard drive and you have insufficient space you've not installed
lina2011 [118]

First, check that your drivers are up to date. The lag could be caused by outdated drivers that are essential in running your system smoothly. New updates will fix bugs, known errors and will make programs work better and faster. Next, run your anti-virus software to check if malware, spyware, and adware that could be putting your computer at risk by installing hidden files, downloading stuff from the internet and uploading sensitive information from your computer. These unauthorized activities could be eating up your RAM in the background without you knowing and thus making your computer run slowly.

7 0
3 years ago
Read 2 more answers
What are like arms surrounding all the other code blocks?
liq [111]

Answer:

Parenthesis

Explanation:

I code

4 0
3 years ago
Read 2 more answers
Gloria is in her sophomore year of college and works part time. She has assignments saved on her home computer, her aunt's lapto
Tanzania [10]
I think this answer, "<span>Upload all existing documents to a cloud-based program," is correct. Hope I helped!!</span>
4 0
3 years ago
Read 2 more answers
Which statement is true?
Klio2033 [76]

Answer:

You need to import the deque methods in order to use a deque.

Explanation:

the correct option is B

You need to import the deque methods in order to use a deque.

Please mark me as brainliest

5 0
3 years ago
Read 2 more answers
In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____
Mariana [72]

<u>Answer:</u>

<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>

<u>Explanation</u>:

<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.

<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.

So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data. </em>

4 0
3 years ago
Other questions:
  • Which routine best ensures email safety?
    7·2 answers
  • True or false over the course of ecological succession,species diversity increases over time?
    12·2 answers
  • What time is it in Ohio?
    12·2 answers
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
    9·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • The table button is present in the ……… tab.​
    14·2 answers
  • When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the v
    12·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • On a leading-trailing system technician A says that both shoes do equal work when stopping while going in reverse. Technician B
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!