Where can
а a
radio be found and how
they used​

Answers

Answer 1

Answer:

I don't know if I'm the only one who doesn't understand I'm sorry.

Explanation:


Related Questions

What classes should I take in high-school for majoring in computer science?

Answers

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement

Answers

Answer:

VLANs

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

What is Qbasic programming language?​

Answers

Answer:

QBASIC is a high level programming language that allows us to write programs. BASIC uses English like words and mathematical symbols to write programs. The programs written in QBASIC need to be converted into machine codes. QBASIC provides working area to write programs and QBASIC has its own Interpreter

Explanation:

A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual

Answers

Answer:

I believe it is logical.

Answer:  c) logical

Explanation:

:)

ok im asking a legit question cuz the teacher asked us what our favorite game was and how to play it and also what youve don in it recently .... its homework so help me out

Answers

Answer:

Mario Baseball, its where you form a team of your favorite mario characters and play baseball against the other team! Its the best!

Explanation:

What the price of XRP right now??????

Answers

Answer:

$0.579

Explanation:

I'm pretty sure that's the answer.

I made a fish emoji what do you think >{'_'}< should I change anything

Answers

Answer: It is beautiful

Explanation:

☁️ Answer ☁️

666/69 I like it. : )

Use the drop-down tool to select the correct answer.

Government agencies work to catch people who engage in software piracy, and can also help to stop them by filing lawsuits.

Answers

Answer:

Software producers

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, government agencies work to catch people who engage in software piracy, and software producers can also help to stop them by filing lawsuits. Software producers or developers are saddled with the responsibility of filing lawsuits against pirates or intellectual property theft who engages in the illegal use of patents or licensed software applications.

In a single paragraph, write about the connections between web servers and web pages. Select and differentiate between their various characteristics and how they work together.

Edge please don't copy paste, 20 points

Answers

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

Answer:

web servers hold all the info that the website has on it, most servers hold multiple websites

Explanation:

It is used between two or more computers. One computer sends data to or receives data from another computer directly.

Answers

Answer:

File transfer protocol (FTP)

Explanation:

An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.

Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.

There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.

The three (3) main types of TCP/IP protocol are;

I. HTTP.

II. HTTPS.

III. FTP.

File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.

Using the information below, answer the question to the right. Which function should you use to extract shipping values from the Lookup Table?

Answers

Answer: HLookup

Explanation:

HLookup is a function in Microsoft Excel that is part of the Lookup functions, that is, it is used to lookup a value from another table or cell so that it reflects in the desired table.

The “H” in the HLookup stands for Horizontal, that is Horizontal Lookup.

The HLookup function works by looking for a value in the top row of a table or array of values and returning the value in the same column from a row that is specified.

The function is;

=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])

So, to extract our shipping value from the lookup table, we use the formula;

=HLOOKUP(C2,$B$11:$E$12,2)

Choose the type of collection described.

A ___ uses square brackets. You use append to add to the collection.
A ___ uses curly brackets. You use update to add to the collection.
A ____ uses parentheses. You cannot change it once you create it.

Answer choices for all three:
•List
•Tuple
•Dictionary

Answers

Answer:

1) List

2) Dictionary

3) Tuple

Explanation:

A list uses square brackets. It is used to store multiple items in just one variable. They are usually changeable and give room for duplicates. You use append to add to the collection.

A dictionary uses curly brackets. You use update to add to the collection. A dictionary is created by placing the elements in curly brackets and separating them with a comma. It is changeable and it does not give room for duplicates.

A tuple uses parentheses. You cannot change it once you create it. It is an ordered list of elements that is finite and can also store multiple items in one variable.

Please help with my assignment! Use python to do it.

Answers

Answer:

I cant see image

Explanation:

can you type it and I'll try to answer

Use the drop-down menus to complete the steps for filtering records in a form.

1. Open the (1) tab.

3. In the Sort & Filter group, click (2), and click Filter by Form.

4. Enter or select a value to set the filter.

5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.


1= create, database tools, file, home

2= advanced, filtering, find, new

3= ascending, descending, apply filter, toggle filter

Answers

Answer:

Home, advanced, apply filter

Explanation:

edge 2021

In the completion of the steps for filtering records, one can:

Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter.  

What is filtering of records?

Filtering is know to be a very vital methods that is used  to see only the data that a person want to be shown in Access databases.

Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.

Learn more about filtering records from

https://brainly.com/question/22238933

#SPJ1

HELP mE PLZ

Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.

Remove unwanted files.
Reboot the computer.
Back up her data.
Scan for viruses.
Delete the browsing history.

Answers

Answer:

scan for viruses

remove unwanted files

back up her data

Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.


people make unintentional mistakes


people do not know about cybersecurity protocols


workplaces tend to have too strict cybersecurity protocols


cybersecurity specialists do not really help


people deliberately try to hack into the network

Answers

Answer:

people make unintentional mistakes

people do not know about cybersecurity protocols

people deliberately try to hack into the network

Explanation:

Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;

1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.

2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.

3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.

What is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
PopWhat is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
Pop

Answers

Answer:

Remove

Explanation:

A method that deletes an item from a list using the item’s value is "Remove"

The "remove () function in python language indicates the specific element or character to be that needs to be removed.

For example

myList = ["Jane",16,34,52,"Lamar",13,27,20]

myList.remove(34)

myList

OUTPUT : ["Jane",16,52,"Lamar", 13,27,20]

Therefore, by printing the list using the print(), we can observe that the element 34 has been removed from myList.

Hence, the correct answer, in this case, is " Remove."

is this right or not???????????

Answers

I think it’s true Bc some people may use different techniques

Answer:

yes you are correct

Explanation:

Pie charts are best used for

Answers

Answer:B

Explanation:Showing parts of a whole.

An electrician uses a device called a volt meter. The volt meter is an example of
O hardware
software

Answers

Answer:

hardware

Explanation:

A voltmeter can be defined as an electrical device used for measure voltage level or the amount of voltage present in a circuit.

In this scenario, an electrician uses a device called a volt meter. The volt meter is an example of hardware.

A hardware refers to any device, machine or equipment that can be handled physically (touched) and seen with the naked eyes. Other hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

On the other hand, software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

(20points)
Why did Jinny get an error when she tried to use the variable 1stName?

Variables should be two words.
Variables cannot begin with a digit.
Variables should start with a number.
Variables should always be camelCase

Answers

Answer:

PLEASE LISTEN TO ME!! THE OTHER ANSWER IS WRONG!

Explanation:

The correct anwer is "Variables cannot begin with a digit"

can somebody help me with this plzzz, I watched the video but I don’t got it :’(

Answers

Answer:

n,

Explanation:

The answer is n. Hope this helps

WHAT DOES THE SCRATCH CODE BELOW DO?

Answers

Answer:

the first one

Explanation:


What is the default view in a Word document? (5 points)
Copy View
Editing View
Paste View
Reading View

Answers

Answer:

EDITING VIEW

Explanation:

Although Microsoft word has several different ways you can view or edit your documents.
The Default View is Editing View.

Hello anyone to speak?

Answers

Answer:

hey hope you have a good day or night :)

Write IF() function for student 3, If total mark is greater than 10 then print
the text “you have scored good" else print“ you need to improve" *

Answers

Answer:

Explanation:

The following code is written in Java. The if() function is actually called an if statement. The following code can be copied and pasted where you need as long as it is within the scope of the mark variable in order to call it and compare it to 10

if (mark > 10){

           System.out.println("you have scored good");  

       } else {

           System.out.println("you need to improve ");

       }

Using the table to the right, answer the following questions. Values shown in B5, B9, B13, and B17 represent ______. The value shown in B18 ______. ______ allows you to calculate the sum of selected values without duplicating values in the grand total.

Answers

Answer:

Values shown in B5, B9, B13, and B17 represent

✔ subtotals.

The value shown in B18

✔ does not include the values of B5, B9, B13, and B17.

✔ The subtotal function

allows you to calculate the sum of selected values without duplicating values in the grand total.

The values shown in B5, B9, B13, and B17 represent  subtotals. The value shown in B18  does not include the values of B5, B9, B13, and B17.

What is the SUBTOTAL Function in Excel?The subtotal function allows you to calculate the sum of selected values without duplicating values in the grand total.

The SUBTOTAL function in Excel is known to be a function that gives room to system users to make groups and then carry out any other Excel functions.

Conclusively, the functions such as sum that is used in Subtotal function in Excel can aid users when they are analyzing their data.

Learn more about subtotal function from

https://brainly.com/question/14465957

Codehs 9.4.5 Phone Book. Anyone have the answers?

Answers

Answer:

The program is as follows:

phonebook = {}

while True:

   entry_name = input("Name: ")

   if entry_name == " ":

       break

   elif entry_name in phonebook:

       print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))

   else:

       entry_number = input("Number: ")

       phonebook[entry_name] = entry_number

print(phonebook)

Explanation:

This creates an empty dictionary for phonebook

phonebook = {}

This loop is repeated until it is exited by the user

while True:

Prompt for name

   entry_name = input("Name: ")

If name is empty

   if entry_name == " ":

Exit the loop

       break

Else if name exists in the phonebook

   elif entry_name in phonebook:

Notify the user with the name and the phone number

       print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))

If otherwise,

   else:

Prompt the user for phone number

       entry_number = input("Number: ")

Save in the dictionary

       phonebook[entry_name] = entry_number

Print the phonebook

print(phonebook)

Answer:

my_dictionary = {}

while True:

   name = str(input("Enter a name: "))

   if name == "":

       break

   elif name in my_dictionary:

       print("Phone Number: " + my_dictionary[name])

   else:

       phone_number = input("Enter this person's number: ")

       my_dictionary[name] = phone_number

print(my_dictionary)

Explanation: code hs

HOW DO YOU RUN YOUR SCRATCH PROGRAM?

Answers

Answer:

By clicking on the green flag, it starts up the program and if you want to stop it use the stop sign.

To run your scratch program you have to click the green flag, and it will run your program.

Hope that helps.

What type of hacker would a company hire to check for vulnerabilities in their web page?

Answers

A white hat hacker or a certified ethical hacker.

Answer:

a hacker who can infiltrate a highly protected file but cant protect themselves against anime web site ads cant tell if this was a real question if so sorry

Explanation:

Other Questions
the owner of a canoe rental shop is comparing the average monthly rainfall, in inches, to the number of canoe rentals per month. the data shows in the scatter plot. Which sentence correct describes the best data. (Select all that apply) A) the data have a linear association B) The data have a nonlinear association C) The data have a positive association D) The data have a negative association E) The data have at least one outliner F) The data has no outliners Which statement best describes the relationship in the table?AThe number of minutes is proportional to the number of pages, with a unit rate of 1.5 minutes per page.B. The number of minutes is proportional to the number of pages, with a unit rate of2.25 minutes per page.C. The number of minutes is proportional to the number of pages, with a unit rate of4.5 minutes per page.D. The relationship in the table is not proportional. The area of the parallelogram below is ____ square meters. one of the most important new deal programs was the social security act of 1935. what was the purpose of this program??a. to provide a retirement fund for the elderly2. to give unemployment insurance to those who lost jobsc. to strengthen the value of the dollar with a gold standardd. to reduce stock market abuses like those that led to the 1929 crashI think it's either a or b Find the difference in the given lengths of the polygons . (7x + 2) units (6x - 5) units . E = {10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23}A = {odd numbers}B = {multiples of 3}Complete the Venn diagram for this information.6ABe15,2 , what is the coefficient of x?HELPPP !!! Kylie wants to add 10 to 167. She thinks that the 6 represents the number of tens and thats by adding a 10 there are a total of 7 tens. Kylie believes the sum is 177. Which of the following is true about kylie's answer Plz help ASAP look at the pictures its the question and stuff plz and thank you On August 8, 2020, Sam, single, age 62, sold for $210,000 his principal residence, which he has lived in for 10 years, and which had an adjusted basis of $60,000. On November 1, 2020, he purchased a new residence for $80,000. For 2020, Sam should recognize a gain on the sale of his residence of: a.$130,000 b.$25,000 c.$50,000 d.$0 e.None of these choices are correct. x/41=3What is the value of x? PLEASE HELPA number b increased by 4 is greater than or equal to 15. When crossing over take places chromsomes A. Decrease in number B. Produce new genes C. mutate in the first division D. exchange segment of DNA In bunnies long ears are dominant over short ears. If two heterozygous bunnies are crossed, what is the probability their offspring will have the long ear phenotype? 1. 25% 2. 50% 3. 75% 4. 100% This molecule undergoes a substitution reaction through an SN1 pathway when warmed and stirred with HBr. Draw the two substitution products of this reaction. Show the correct stereochemistry by using wedges and dashes at all chiral centers. In part two, select the term that correctly describes the relationship between the products. How many triangles can a polygon with 32 sides be sectioned into? can you check my answers? Delonte has 1,350 followers on social media. Each week, the number of followers increases by 2%. Which function represents his number of followers for w weeks? Who can help me out with this please?? Hey all!Please only answer if you know the answer, the comment section is right below. Please don't waste my points!Also, please show all of your work, you are trying to help me better understand the concept, not just give me the answer.The image is down below. Show work! Thanks!