Answer:
Sheave wheel and hoist cable
Explanation:
The sheave wheel is a pulley wheel that sits above the mine shaft. The hoist cable passes over the sheave wheel and then down the shaft of the mine. The sheave wheel reduces the sliding friction of the mine cable. The head frame is the structure that supports the sheave wheel.
A) hotspot
Bluetooth is for short distance and pan is Personal area networks (PANs) connect an individual's personal devices
Online education is a teaching practice delivered through the internet. The students learning from online platforms must be taught to be ethical.
<h3>What is the importance of ethics and integrity?</h3>
In the online education system, the students should learn to be ethical and integral as it enables the students and their teachers to be creative, free to create ideas, and acknowledge others' work.
Ethics teaches the students to develop their personalities and behavior. Students' integrity allows them to be honest, responsible, and fair towards their work and instructor.
Therefore, option A. online learning students must be taught to be ethical.
Learn more about online learning here:
brainly.com/question/14708323
#SPJ1
Answer:
<u>d. Statement A is true and Statement B is false</u>
Explanation:
Indeed, when using duplex transmission either node can transmit while the other node can receive data from the network. Also, in half-duplex transmission, both the nodes can transmit as well as receive data.
However, in half-duplex transmission, the nodes <em>cannot </em>transmit and receive data at the same time. Hence, this makes Statement B false, while Statement A is true.
Answer:NULL Scan
Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).
The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.