1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
2 years ago
6

What do you think is the reason why there are two kinds of transmission mode in computer networking?

Computers and Technology
1 answer:
saul85 [17]2 years ago
7 0

Answer:  Transmission mode or communication mode is referred to as transmission of data between two devices using a communication channel that includes an optical fiber, copper wires, wireless channels, and various storage media. The data that gets transmitted is in the form of electromagnetic waves. There are various ways of data transmission where the message that is passed is in the sequence of pulses using digital modulation. The transmission mode of data was first introduced in a computer networking system during the 1940s in modems, then in LANs, WANs, repeaters, and other networking system

is this what u are looking for?

You might be interested in
What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me
sergiy2304 [10]

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

3 0
2 years ago
What do to keep in a database
igor_vitrenko [27]
<span>Customer Relationship Management is really important for many businesses, in particular, small ones, as it is the focus point of sales and marketing strategies. At the centre of a business’ CRM is their customer database, which is a really helpful tool enabling them to; identify customer trends, create customer loyalty and increase their customer communication. All businesses have a customer database, whether it is a computerised system or a piece of paper with names and details written on. Here are some tips on how to create and maintain your database in order to get the most out of it.</span>
5 0
3 years ago
Read 2 more answers
Which of the following may businesses use to screen out applicants for a position? A. social media B. applications C. resumes D.
Nataly_w [17]
The correct answer is E
8 0
3 years ago
Read 2 more answers
An alternative to increasing the column widths and row heights is to ____ to fit the current width of the column
cupoosta [38]
It seems that you have missed the given options for this statement, but anyway, here is the correct answer. An alternative to increasing the column widths and row heights is to SHRINK THE CHARACTERS IN THE CELL to fit the <span> current width of the column. Hope this answer helps. </span>
4 0
3 years ago
H. What is recycle bin?<br>-&gt;​
tatyana61 [14]

Answer:

Trash application, the Recycle Bin

6 0
2 years ago
Other questions:
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • How long would it take a 8 bit computer to calculate π to the thousandth place?
    8·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • The decimal number 3 is ___ in binary the 2s column plus the 1s column.
    11·1 answer
  • Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
    11·2 answers
  • Why are free web based providers so popular?
    12·1 answer
  • Rtjfifjjir<br> jhjjbkjkjjgggjhvhjvhf
    9·1 answer
  • Which of the following terms best describes the product development life cycle process?
    6·2 answers
  • Describe how to add slide numbers and image to a Microsoft power point presentations ?​
    5·1 answer
  • I am a new linux and unix system user. how do i find out the user and groups names and numeric ids of the current user or any us
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!