1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
15

What are the two types of electronic components

Computers and Technology
2 answers:
Pavel [41]3 years ago
8 0

Answer:

The two types of electronic components are:

Active components- Active components are devices that can amplify an electric signal and produce power.

Passive components- Passive components cannot control electric current utilizing a second electrical signal.

These components are diametrically different from each other based on their functional properties and operation.

IrinaVladis [17]3 years ago
5 0

Answer:

The two type of electronic components are Active components and passive components

Active components are parts of a circuit that rely on an external power source to control or modify electrical signals. ... - Passive components like resistors, transformers, and diodes don't need an external power source to function. These components use some other property to control the electrical signal.

You might be interested in
The Sussex Educational Processor executes an instruction every 3 clock cycles. Explain why that is the case and specifically wha
aniked [119]

Answer:

2b2t

Explanation:

2b2t

5 0
3 years ago
When formulating a linear programming model on a spreadsheet, the decisions to be made are located in the data cells.
Alinara [238K]
True. Gotta have 20 characters to answer
8 0
1 year ago
Is mmorpg an example of virtual community
Inga [223]
Yes I would say it is.
4 0
3 years ago
Read 2 more answers
Write a program that will allow a grocery store to keep track of the total number of bottles collected for a seven-day period. T
Anna35 [415]

Answer:

  • Print the values days of bottles.
  • Display total number of bottles collecting.
  • Display the payout for this transaction.

Explanation:

Program:-

DEPOSIT_PER_BOTTLE = 0.10

another = "Y"

while another=="Y":

   print("Input Values 7 days of bottles:")

   total = 0

   for I in range(7):

       collected_bottles = int(input())

       total += collected_bottles

   payout = total*DEPOSIT_PER_BOTTLE

   print("Total number of bottles collected: {:,}".format(total))

   print("Payout for this transaction $%.2f"%payout)

   another = input("Do you want to complete another transaction? ").upper()

7 0
2 years ago
__________ filtering requires that the filtering rules governing how the firewall decides which packets are allowed and which ar
DIA [1.3K]

Answer:

Static

Explanation:

A computer or system administrator who want packets to be filter have to set or configured a filtering rules which will enable and allow the firewall to decide on which of the packets that will be allowed to function and the packets that will be denied not to function to be developed and as well installed on the firewall have to make use of what is called STATIC FILTERING reason been that STATIC FILTERING make it of necessary that the filtering rules should be developed and installed with the firewall.

6 0
2 years ago
Other questions:
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • What does a network backbone do? allows data to be delivered more quickly and efficiently makes data transfer from the cloud mor
    14·2 answers
  • Tell me the shortcut keys used in Ms PowerPoint ?​
    6·2 answers
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
    9·1 answer
  • What will the output be from the following program?
    5·1 answer
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Please tell fast plzzzzzzzz​
    9·2 answers
  • Anyone use zoom<br><br>code:- 2574030731<br>pass:- HELLO<br>Z●●M ​
    14·2 answers
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!