1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
12

Hey plz help, and thanks

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0
D maybe??? Sorry if it’s wrong
timofeeve [1]3 years ago
7 0

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

You might be interested in
DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
Elina [12.6K]

Answer:

False

Explanation:

DSL(Digital Subscriber Line) :-It is a technology in which user gets high bandwidth connection over ordinary telephone lines.

This technique uses data modulation to achieve higher throughput over the telephone lines.Telephone lines carry voice signals over a small range of frequencies between 300 and 3300 Hz. So the frequencies that are higher are unused and available for data transfer.

DSL connection uses a modulation technique based on amplitude or phase modulation. With the help of modulation techniques DSL uses these unused higher frequencies.It uses frequency range higher than 300 to 3300 hz.

5 0
4 years ago
When you think of computers, I want you to think:
jekas [21]

Answer:

Explanation:

When I think about computers, I can understand about the software and the hardware, we can touch the hardware, but the software don't because is only data stored in the hardware, we can interact with the stored data using the hardware, we can complete a system with data, software, hardware, and people, people try to learn about software because it is better paid than fix a hardware.

5 0
3 years ago
An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
Nataliya [291]

Answer:

D1= 60 HOSTS

network address - 200.120.80.64/26

subnet mask -255.255.255.192/26

D2 = 90 HOSTS

network address - 200.120.80.0/25

subnet mask -255.255.255.128/25

D3 = 90 HOSTS

network address - 200.120.80.128/25

subnet mask -255.255.255.128/25

5 0
4 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
How old was the mummy where they found a wooden prosthetic toe on him?
White raven [17]

Answer:

950 Bc and 710 bc

Explanation:

They could of course have remained bare foot or perhaps have worn some sort of sock or boot over the false toe, but our research suggests that wearing these false toes made walking in a sandal more comfortable," she continued. The wood and leather toe was made for a woman that likely lived between 950 BC and 710 BC.Oct 2,

6 0
3 years ago
Other questions:
  • If a method writes to a file it should start out like (fill out the blank, what should you write after the parameters in the met
    12·1 answer
  • An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
    8·1 answer
  • True or false? malware problems and other compromises of your computer information are rare.
    15·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • What is the advantage of using the clipboard task pane?
    7·1 answer
  • The physical components of a computer are called what?
    8·1 answer
  • PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!
    9·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • Consider a file/directory with the following info:
    14·1 answer
  • Display the desktop without minimizing or closing any windows.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!