1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
5

Electrical data suitable for transmission is called a(n)

Computers and Technology
1 answer:
Deffense [45]3 years ago
4 0

Answer:

Signal

Explanation:

You might be interested in
My code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap a
marshall27 [118]

Answer:

Explanation:

The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75

input_year = int(input())

if input_year % 4 == 0:

   if input_year % 100 == 0:

       if input_year % 400 == 0:

           print(input_year, "is a leap year")

       else:

           print(input_year, "- not a leap year")

   else:

       print(input_year, "is a leap year")

else:

   print(input_year, "- not a leap year")

3 0
3 years ago
What is hyperlink and its used in website
snow_tiger [21]

Explanation:

Hyperlink is the primary method used to navigate between webpages.

Hyperlink can redirect us to another webpages, such as websites that has graphics, files, sounds on the same webpage.

6 0
3 years ago
The backbone networks of the Internet are typically owned by long-distance telephone companies called
Aneli [31]

Answer:

network service providers

Explanation:

The backbone networks of the Internet are typically owned by long-distance telephone companies called network service providers.

A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to small internet service providers.

5 0
3 years ago
Which phrase best describes a spreadsheet? A. a table designed to help with numerical data B. a table designed to help with text
kakasveta [241]
A spreadsheet does both so it is letter choice c
3 0
3 years ago
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create
lara31 [8.8K]

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

<em>So task 1 requires a word processor</em>

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

<em>So task 1 requires a graphics software</em>

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

5 0
3 years ago
Other questions:
  • Which of the following is the largest disadvantage of hydropower?
    8·2 answers
  • ____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.
    14·1 answer
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • Which cisco ios command is used to display the current ospf neighbors and their rids?
    11·1 answer
  • 4. An outline is most like which of the following? (1 point)
    14·1 answer
  • Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.
    14·1 answer
  • Q1 To remove filter
    15·2 answers
  • Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
    5·2 answers
  • The disk you inserted was not readable by this computer
    11·1 answer
  • The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!