1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
1 year ago
13

Select the correct technical term for each definition by using the drop-down menus.

Computers and Technology
1 answer:
Ber [7]1 year ago
6 0

Answer:

The answers are 1.) input devices, 2.) webca m, and 3.) touchscreen

I hope this helps! ^-^

You might be interested in
What aspects of your life are most influenced by media and technology​
Anastasy [175]

Answer:

Everyday life

Explanation:

Television

office work (computers )

Music

video games

ware house work uses technology

work from home jobs use technology

cellular towers

5 0
2 years ago
Is spread spectrum transmission done for security reasons in commercial WLANs?
bearhunter [10]

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.

6 0
3 years ago
You have to communicate a signal in a language that has 3 symbols A, B and C. The probability of observing A is 50% while that o
Vlada [557]

Answer:

Huffman code is use for encoding the language. The entropy when calculated is 1.5.

Explanation:

Using Huffman Coding scheme to encode:

The huffman coding scheme is described in the attachment.

To find entropy; we use the formula given below:

H = ∑p log_{2}  \frac{1}{p}

where H = Entropy and p = probability

p(A) = 50% = 1/2

p(B) = 25% = 1/4

p(C) = 25% = 1/4

H = \frac{1}{2} log_{2} 2 + \frac{1}{4}  log_{2} 4+ \frac{1}{4} log_{2}4\\H = \frac{1}{2}(1) + \frac{1}{4}(2) + \frac{1}{4}(2)\\H = \frac{1}{2} + \frac{2}{4} + \frac{2}{4}\\H = \frac{1}{2} + \frac{1}{2} + \frac{1}{2}\\H = \frac{3}{2}\\H = 1.5

Download pdf
7 0
3 years ago
Create a program that allows the user to input a list of first names into one array and last names into a parallel array. Input
natita [175]

Answer:

The program in Python is as follows:

firstName = []

lastName = []

while True:

   fName = input("First Name: ")

   lName = input("Last Name: (Enter to quit): ")

   if not lName:

       break

   firstName.append(fName)

   lastName.append(lName)

for i in range(len(firstName)):

   print(firstName[i] . lower()+"."+lastName[i] . lower()+" mycollege . edu")

Explanation:

See attachment for complete source file where comments are used as explanation

Download txt
8 0
3 years ago
Vitamins and minerals dissolve easily in water.True or false?
noname [10]
True vitamins and minerals dissolves in water
8 0
2 years ago
Other questions:
  • How many times do you usually use npm?<br> Put your answer in the box.
    6·1 answer
  • This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task
    11·2 answers
  • Using a network without the network owner's permission is known as ________.
    10·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • When addictions escalate and the individual loses his or her job or drops out of school, _______________.
    12·2 answers
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Which type of boot authentciation is more secure?
    10·1 answer
  • How you use ict today and how will you use it tomorrow
    14·1 answer
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!