1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
6

What is the first phone ever made?

Computers and Technology
1 answer:
pickupchik [31]3 years ago
3 0

Answer:

the Telephone

Explanation:

Before the invention of electromagnetic telephones, mechanical acoustic devices existed for transmitting speech and music over a greater distance greater than that of normal direct speech. The earliest mechanical telephones were based on sound transmission through pipes or other physical media.The acoustic tin can telephone, or "lovers' phone", has been known for centuries. It connects two diaphragms with a taut string or wire, which transmits sound by mechanical vibrations from one to the other along the wire (and not by a modulated electric current). The classic example is the children's toy made by connecting the bottoms of two paper cups, metal cans, or plastic bottles with tautly held string.Some of the earliest known experiments were conducted by the British physicist and polymath Robert Hooke from 1664 to 1685. An acoustic string phone made in 1667 is attributed to him.For a few years in the late 1800s, acoustic telephones were marketed commercially as a competitor to the electrical telephone. When the Bell telephone patents expired and many new telephone manufacturers began competing, acoustic telephone makers quickly went out of business. Their maximum range was very limited. An example of one such company was the Pulsion Telephone Supply Company created by Lemuel Mellett in Massachusetts, which designed its version in 1888 and deployed it on railroad right-of-ways.Additionally, speaking tubes have long been common, especially within buildings and aboard ships, and they are still in use today. The telephone emerged from the making and successive improvements of the electrical telegraph. In 1804, Spanish polymath and scientist Francisco Salva Campillo constructed an electrochemical telegraph.The first working telegraph was built by the English inventor Francis Ronalds in 1816 and used static electricity. An electromagnetic telegraph was created by Baron Schilling in 1832. Carl Friedrich Gauss and Wilhelm Weber built another electromagnetic telegraph in 1833 in Göttingen.At the University of Gottingen, the two have been working together in the field of magnetism. They built the first telegraph to connect the observatory and the Institute of physics, which was able to send eight words per minute.

You might be interested in
ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
dybincka [34]

Answer: virtual private network

Explanation:

A virtual private network, is normally refered to as a VPN is simply referred to as an encrypted connection which is done over the Internet. We should note that it usually take solace from a particular device to th network.

The function of the encrypted connection is to assist in the transmission of sensitive data. It works by using the Internet to relay communications and it maintains privacy through security procedures.

8 0
3 years ago
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Write a program which promptsuser to enter an integer value. Using while loop print the valuesfrom
tino4ka555 [31]

Answer:Following is the c++ code for the problem:

#include <iostream>

using namespace std;

int main() {

   int number;

   cout<<"Enter the number"<<endl;

   cin>>number;

   int i=0,c=0,odd[500];

   while(i<=number)//loop for printing the numbers form 0 to number.

   {

       cout<<i<<" ";

       if(i%2!=0)// storing in the odd array if the number is odd.

       {

           odd[c++]=i;//storing odd numbers..

       }

       i++;

   }

   cout<<endl;

   i=0;

   cout<<"The odd numbers are "<<endl;

   while(i<c)//loop to print the odd numbers.

   {

       cout<<odd[i]<<" ";

       i++;

   }

   cout<<endl<<"The prime numbers are "<<endl;

   i=0;

   int sum=0;

   

   while(i<c)//loop to print the prime numbers..

   {

       int div=2;

       while(div<odd[i])

       {

           if(odd[i]%div==0)

           break;

           div++;

       }

       if(div==odd[i])

      {

           cout<<odd[i]<<" ";

           sum+=odd[i];//updating the sum..

      }

       i++;

   }

   cout<<endl<<"The sum of odd prime numbers is "<<sum<<endl;//printing the sum..

return 0;

}

Output :

Enter the number

49

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49  

The odd numbers are  

1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49  

The prime numbers are  

3 5 7 11 13 17 19 23 29 31 37 41 43 47  

The sum of odd prime numbers is 326 .

Explanation:

First I have printed the values from 0 to n and i have taken an array to store odd numbers.After that i have printed the odd values.And after that i have printed prime numbers among the odd numbers and their sum. These all operations are done using while loop.

6 0
3 years ago
You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. You have just created a directory nam
timofeeve [1]

Answer:

E.

Explanation:

Based on the information provided within the question it can be said that the most likely cause is that David does not have the write permission on the directory. This permission basically grants the individual the ability to make changes to a certain file or directory. Therefore if David does not have write permission it would explain why he is unable to save his reports in that directory.

8 0
3 years ago
Question #4
Yuliya22 [10]

Answer:

tuple

Explanation:

the inner machinations of my mind ar- hey wait i´m not Patrick

8 0
3 years ago
Other questions:
  • Which diagrams represent how roles can affect careers and lifestyles
    11·1 answer
  • Which Google Analytics visualization compares report data to the website average?A. Pivot viewB. Comparison viewC. Performance v
    8·1 answer
  • In the receiving computer, UDP receives a datagram from the __________ layer.
    15·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • Where is voice data stored in Android?
    11·1 answer
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • What is the output of the following program?
    5·1 answer
  • WILL GIVE BRAINLIEST
    5·2 answers
  • In a mobile phone network, how many times as strong would
    6·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!