1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
11

Technology and Communications Quiz Active 1 Which of the following inventions has had the greatest impact on sound technology? A

. the extension cord
B. the tape recorder
c. the telegraph
d. the microphone​
Computers and Technology
1 answer:
liraira [26]3 years ago
6 0

Answer:

B the tape recorder bec half century later made sonorities not only reproducible but also alterable.

You might be interested in
Andre is teaching a class without the software development cycle while teaching the analyst phase which task should Andre mentio
Delvig [45]

I have no idea sorry

7 0
3 years ago
Marijuana and hashish come from the hemp plant?
raketka [301]
Yes they come from the hemp plant
5 0
4 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Help!!!!!!<br>please<br>Who will give the answer I'll mark him/her as brainlist..​
damaskus [11]
17, 12.5, 6, and 10. HOPE THIS HELPS
4 0
3 years ago
How to remove duplicates from list in python?
kondaur [170]
<span> the new way of </span>removing duplicates<span> from an iterable while keeping it in the original order </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • c++ design a class named myinteger which models integers. interesting properties of the value can be determined. include these m
    14·1 answer
  • Software development team leaders need (blank)<br> skills to excel in directing their teams.
    7·1 answer
  • Name the different tools used byMMDB.
    14·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • A stepping function allows a program
    11·2 answers
  • A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
    8·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
    5·2 answers
  • 1.Discuss the complexities of owning and sharing digital information.
    5·1 answer
  • In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!