During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the general direction of movement of the other aircraft?
a) The other aircraft is crossing to the left
b) The other aircraft is crossing to the right
c) The other aircraft is approaching head-on

Answers

Answer 1

Answer:

a) The other aircraft is crossing to the left

Explanation: An aircraft is any vehicle such as an airplane that is able to fly in the air through the support of the air. Aircrafts usually overcome the force of gravity fr it to be able to sustain it's long movement in the air. An aircraft can either be an airplane or a balloon etc.

One of the traffic signals of the air flight system is that if an aircraft is flashing and steady red light ahead at the same altitude,it means the airplane is crossing left.


Related Questions

Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:

a. does not share a communication circuit

b. splits the communication circuit vertically (with time slots) instead of horizontally

c. increases the wavelength and phase angles of the baseband frequency used for transmission

d. moves the baseband of a circuit by shifting it to a higher frequency

e. reduces baseband signal velocity more than frequency division multiplexing

Answers

Explanation:

We can divide the multiplex in different categorize, for example:

FREQUENCY DIVISION MULTIPLEXERS (FDM) TIME DIVISION MULTIPLEXERS (TDM) STATISTICAL TIME DIVISION MULTIPLEXERS (STDM).

But in this case, we're going to explain about the time and frequency, because the time division multiplex differ to frequency, because the circuit is divided horizontally, and the time is vertically

b. splits the communication circuit vertically (with time slots) instead of horizontally

1. Google Tag Manager helps you manage your website in which of the following ways? (select all answers that apply) a. Simplify and speed up tag deployment b. Specify when tags should fire c. Manage different versions of tags d. Increase audience reach 2. Google Tag Manager can only be used with Google tags.True / False. 3. To create a tag implementation plan, what are the recommended guidelines? (select all answers that apply) a. Decide which of your existing site tags you can move into Tag Manager b. Decide what static and dynamic values you’ll want to pass from your website c. Choose which tags can collect the data you need d. Decide which Tag Manager account to link to Google Analytics

Answers

Answer:

Answer 1

a. Simplify and speed up tag deployment

b. Specify when tags should fire

c. Manage different versions of tags

Answer 2

False

Answer 3

d. Decide which Tag Manager account to link to Google Analytics

Explanation:

If you understand what Google Analytics is, then it will not be hard for you to understand what Google tag manager is and how this management tool works. Unlike Google analytics, the core function of the Google Tag Manager is to help create and launch tags from both HTML and JavaScript. Once launched, these tags help you level up your data analytics for your websites or mobile applications and share the data with Google analytics. Advantages of using Google Tag Manager are

Collaboration tools like Slack, Skype, and many others in most companies make work easier. GTM is one of these collaboration tools. With GTM, teams can log in, modify, simplify, and speed up tag deployment instantly and much quickly. GTM has a feature that helps update tags in your container snippets across your websites and this saves a lot of time.

Apart from tags, Google Tag Manager has five other components that it can use to achieve its strategy. These five components include

Container SnippetVariablesTriggersValuesOperators

Triggers, for instance, when used correctly help can tell your tags what time they should collect and send data to different applications.

Deploying and implementing a tag using the Google Tag Manager is very easy. A few guidelines must be followed to achieve this

Decide which of your existing site tags you can move into Tag Manager – You can decide to select a new tag from the default list provided to you in the tag manager or use an existing site tag to move it into the tag manager for later deployment.

Decide what static and dynamic values you’ll want to pass from your website and Choose which tags can collect the data you need - You should also consider configuring a trigger that will tell Google Tag Manager to fire your tag. You may want your tags to fire up on all pages of your site in some cases and a subset of your pages in other cases. You can also add additional configurations like tag names and tracking ID.

A,List at least features that can be used to format a report. b,What must you do first in order to change the font type,size,and color of particular text. c,Would you consider using text effect for writing an application for sick leave yo your principle.Give reasons for your answer. d,If you want to draw the attention of the readers towards the key point in your study notes,which tool would you use. e,outline the steps needed to create borders for a flyers you are making for the spring carnival in your school.

Answers

Answer: (A)= font size, font colours, font type, text effects, shapes, bold, underlining, borders, margins, paragraphs, etc

(B)= Select that particular text by using your cursor to select and click on it.

(C)= yes, I would use text effects, REASON: to make it look professional

(D)= the bold option

(E)= Select page--->Click on the page editing tool---> select the border tool.

Explanation:

(A)== Features like the font size, font type, font colour, bold, underline, shapes, etc can be used to format a report.

(B)== You have to first select the particular text. This can be done by using the cursor to hover on the particular text then you select text, after which you can now edit it.

(C)== yes, Reasons: text effects can to used in making the application look more professional.

(D)== The bold text effect can be used to highlighten that a particular keyword is important.

(E)==

Step 1: select the particular page

Step 2: select the page editing tool

Step 3: select insert borders option

Step 4: customize it to your preferred taste.

Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above, into an initially empty implicit binary max-heap. Show the heap throughout the process but write down the heap as an answer after every 3 INSERT() operations. (Just hand-simulate the behavior of the implicit binary max-heap, and draw the resulting heap, both throughout the entire process and the ones after every 3 INSERT() operations as answers (note that the former is to show all your work so that partial credits can be given in case you make mistakes, while the latter (answers) are the ones to be graded). Draw them in the form of a tree rather than an array.)

Answers

Answer:

See attachment below

Explanation:

Which one of the following statements is true?
a. In one’s complement format, the leftmost bit is saved for the sign where 1 indicates a negative number and 0 indicates a positive number.
b. The smallest integer that can be represented by a sign-and-magnitude binary number is always 0.
c. It is impossible to store 1610 in 4-bits because overflow will occur. d. The two’s complement representation of +6710 in 8-bits is 1000011.

Answers

Answer:

a. In one’s complement format, the leftmost bit is saved for the sign where 1 indicates a negative number and 0 indicates a positive number.

Explanation:

In binary numbers, 1's complement is used to represent the signed binary numbers. In unsigned numbers, there is no need of sign. But in signed binary numbers a signed bit is required. To add the bit that is represent the sign of the number in binary, 0 represents the positive number while 1 represents the negative number.

If we have a number and want to convert it in signed binary number, we just takes it 1's complement and add the signed bit at the left of the number.

E.g.

1 = 0001

is the binary of 1, if we want to add sign, we just add the zero at left most side of the binary which make it positive as given below:

+1 = 0 0001

Now of we want to convert it into negative than, we take 1's complement in which all bits are inverted.

-1 = 1 1110

Final answer:

The correct answer is a. In one's complement format, the leftmost bit indicates the sign, with 1 for negative and 0 for positive numbers.

Explanation:

The true statement among the ones provided is a. In one's complement format, the leftmost bit is indeed saved for the sign where 1 indicates a negative number and 0 indicates a positive number.

b is incorrect because the smallest integer that can be represented by a sign-and-magnitude binary number is -0, which is considered distinct from +0 in this representation method.

c is incorrect because it is certainly possible to store the decimal number 16 (1610) in a 4-bit binary format, specifically as 10000, which does indeed cause overflow if only 4 bits are available, but the claim itself is not expressed as a true standalone statement considering normal binary representations.

d is incorrect because the two's complement representation of +67 (6710) in 8 bits is actually 01000011, not 1000011.

(Game Design) A float is a blank space, used as a placeholder in an array

True or false

Answers

Answer:

You need to understand what is a placeholder in an array or as an example a webpage. When you create a master page in asp.net, you add content placeholder. And you add the required code over there afterwards like header, footer and main body. Similarly, when we create an array that holds float values, we have the blank space as the float, that is going to hold the float values in future when we add values to the array. And hence, the given statement is true. Indeed float is a blank space used as placeholder in an array.

like

float a[5]; in c++

a=[0.5, 0.05] in python.

Explanation:

Please check the answer section.

Answer:

B. False

Explanation:

I listened to the answer above, and it was wrong.

The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and timing of materials needed to complete products and projects is ________________.

Answers

Answer:

"Materials requirement planning" is the correct answer for the above question.

Explanation:

The "Materials requirement planning" is a software system that is used to hold the record of the raw materials. It is used to tell about the material which is present in the stocks. It also used to schedule the delivery.This software is used to enhance the productivity of the company. The above question asked about the software which is needed to keep the record of the raw material. This software is known as "Materials requirement planning".

According to the dual-process model, decision making is influenced by which systems? (Select all that apply.) Creative Gist-based intuition Socioemotional Analytical

Answers

Answer:

Gist-based intuition and analytical.

Explanation:

Assume that a variable hoursWorked has been initialized. Write a statement that assigns the value True to the variable workedOvertime if hoursWorked is greater than 40 and False otherwise.

Answers

Answer:

Following are the statement which is given below:

workedOvertime= hoursWorked > 40 //assigns the value to workedOvertime

Explanation:

In this above statement, there is hoursWorked variable which is already initialized There is also another variable "workedOvertime" which assigns the value of the TRUE if the "hoursWorked" is greater then the 40 otherwise it initializes the value FALSE in the "workedOvertime" variable.

The > operator is used for checking the condition that variable "hoursWorked" is greater than 40 or not.

Final answer:

To assign the correct boolean value to the variable workedOvertime, use the statement workedOvertime = hoursWorked > 40; if hoursWorked is greater than 40, workedOvertime is True, otherwise, it is False.

Explanation:

To determine whether an employee has worked overtime and assign the correct boolean value to the variable workedOvertime, you can use a simple conditional statement. Here is how you would write this statement in most programming languages:

workedOvertime = hoursWorked > 40

This statement checks if hoursWorked is greater than 40. If it is, workedOvertime is set to True; otherwise, it is set to False. This is a common task in programming when dealing with pay computations that include overtime pay.

When you install all the most commonly used files and programs to your computer’s hard drive, you have completed which kind of software installation?

Answers

exe. / windows software installation

A full software installation includes installing all the commonly used programs and files on a computer's hard drive. It might comprise the operating system, essential system utilities, and a spectrum of applications for daily tasks. Additionally, more complex software requires proper placement and path configuration.

When you install all the most commonly used files and programs to your computer's hard drive, you have completed what is known as a full software installation. This type of installation usually includes the operating system bundled with a suite of user software that allows for basic computing tasks.

Operating systems like Microsoft Windows and Mac OS X come with these packages, incorporating essential applications such as a file explorer, and tools for document and photo management. A full software installation ensures that your computer has a wide array of functionalities for everyday use, along with system utilities and drivers that facilitate better interaction between the hardware and system software.

Application software, often referred to as apps, includes programs intended for end-users to carry out a variety of specific tasks. These tasks could range from word processing to managing files in directories such as the Document folder or the Pictures folder. For more complex software installations, it may be necessary to retrieve executable files, place them in a certain directory, typically within $HOME/local/bin, and ensure they are accessible via the $PATH environment variable within the system.

Write the definition of a class Telephone. The class has no constructors,
one instance variable of type String called number,
and two static variables. One is of type int called quantity;
the other is of type double called total. Besides that,
the class has one static method makeFullNumber. The method accepts two arguments,
a String containing a telephone number and an int containing
an area code. The method concatenates the two arguments in the following manner: First comes the area code,
then a dash, then the telephone number. The method returns the resultant string.

Answers

Answer:

public class Telephone{

   private String number;

   private static int quantity = 250;

   private static double total = 15658.92;

}

Explanation:

Answer:

The classification of a phone number

Explanation:

For example, this number represents a typical Nigeria phone number:

009-234-01- 463391

009 is the international dialing code

234 is Nigeria dialing code

01 is the state's area dialing code

Ensuring data backups for data stored on a portable device is generally considered: a. Always required. b. Necessary when the device would otherwise be the only source of hard-to-replace data, but the backup mechanism must also be secure. c. Never necessary. d. Always detrimental to security, so universally discouraged.

Answers

Answer:

The answer is "Option b".

Explanation:

A data backup is a mechanism of generating a duplicate copy from your sensitive files and data like your photos, video clips, documents, and links, for example — so your data is safe and accessible when something occurs to your device, it would be the first to the provider of tough-to-replace data, and it is essential, but its recovery method must be safe, and other choices were wrong that can be described as follows:

In option a, It does not require always, that's why it is wrong. In option c, It is wrong because data backup is necessary. In option d, It doesn't provide detrimental security, that's why it is wrong.

The correct answer is b. Necessary when the device would otherwise be the only source of hard-to-replace data, but the backup mechanism must also be secure.

Backing-up is a crucial process to protect data from loss due to deletion, corruption, theft, or viruses. Here are some basic principles:

Back up your data as soon as possible to avoid relying on a single copy for too long.Identify where your primary dataset will be held and develop a strategy for backing up your data to other hard drives or via electronic transmission.Always ensure backups are stored in secure, separate locations to safeguard the data effectively.Utilize cloud storage as an additional backup measure but ensure the data is encrypted to prevent unauthorized access.For portable devices like laptops and smartphones, back up data regularly due to the significant amount of critical information they store.

Invest in reliable external hard drives, preferably SSD models, for better reliability and reduced physical damage risk. Ensure compatibility with project computers and never entrust the day's data to anyone without copying it to a secure place first. By following these practices, you can minimize the risk of data loss and ensure that your backups are both reliable and secure.

Analyze the following code:

public class Test {
public static void main(String[] args) {
A a = new A();
a.print();
}
}

class A {
String s;

A(String newS) {
s = newS;
}

void print() {
System.out.println(s);
}
}

Answers

Answer:

Constructor issue

Explanation:

When you look at the Class A, the constructor takes one argument as a parameter, a String.

A(String newS) {

s = newS;

}

However, in the main, the constructor does not take any argument as a parameter.

A a = new A();

That's why the code does not compile.

This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking noise coming from inside his computer.What might be the problem with Paul's computer? Magnetic hard drive failed. hard drive failed. Magnetic hard drive crashed None of these

Answers

Answer:

The problem with Paul's computer is that the magnetic hard drive failed.

Explanation:

A magnetic hard drive or hard disk is a non-volatile storage device, which is used to store different information on a computer.

The magnetic disk is made up of numerous magnetic plates, these plates are divided into sectors and tracks. A spindle is present in the middle to rotate the combined plates or the whole unit.

When there is a clicking noise coming from the magnetic disk, it could mean that one of the plates is damaged or if the power to the computer is inconsistent. This can greatly affect the performance of your computer.

Which wireless communication technology is most likely used when synchronizing device information to an automobile?
Bluetooth
NFC
RFID
Wi-Fi

Answers

Answer:

Bluetooth

Explanation:

hope that helps bro

In the context of security in networking, the letters AAA in the term "AAA servers" stand for _____.
A. allowing access automatically
B. accessing all appliances
C. access, applications, and accounting
D. authentication, authorization, and accounting

Answers

Answer:

D) AAA refers to Authentication, Authorization and Accounting.

Explanation:

Authentication

Answer the question of  who are you?.The two most popular options for external user authentication are RADIUS and TACACS

Authorization

Authorization services determine what resources the user can access and what operations are enabled to perform.An authorization type question is how much can you spend?

Accounting

Accounting records what the user does, keeps track of how network resources are used.Example question in what do I spend it?

Answer:

D. authentication, authorization, and accounting

Explanation:

Adam is a sole proprietor. He must file for bankruptcy to reorganize his debt under a repayment plan so he can pay his creditors and continue operating his business. He should file a: a. Chapter 10 bankruptcy. b. Chapter 12 bankruptcy. c. Chapter 7 bankruptcy. d. Chapter 13 bankruptcy.

Answers

Answer:

Option D i.e., Chapter 13 bankruptcy.

Explanation:

He is the sole proprietor. He needs to constantly declare bankruptcy throughout order to restructure the debts through a recovery program, so he can reimburse the creditors as well as proceed to work. He should be to apply a bankruptcy in Chapter 13.

A bankruptcy chapter 13 is considered a restructuring for an income earner. This allows people from modest salaries could establish a program that pays it back both or most of that debt.

Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor. Which is the most capable version of a Microsoft hypervisor you can install on this machine, provided the computer meets all the requirements?

Answers

Answer:

Microsoft Hyper-V Server

Explanation:

Which is true about SCSI connectors? Choose two answers. A SCSI controller can hold several devices on a single chain SCSI connectors are used in high-end servers SCSI connectors are used in laptops SCSI connectors are used on tablets

Answers

Answer:

SCSI controller can hold several devices on a single chain

SCSI connectors are used in high-end servers

Explanation:

Small Computer System Interface (SCSI) is a physical cable to transfer data between a computer and high-end server, and for that, we cannot use this cable in laptops or tables, only we must see the size of the cable to understand and discard that two options, and an advantage of the cable is held several devices on a single chain.

True statements about SCSI connectors are that a SCSI controller can hold several devices on a single chain, and they are used in high-end servers. SCSI is less common in laptops or tablets.

The question is concerning SCSI connectors which are primarily used in computer systems for peripherals. The two true statements about SCSI connectors are:

A SCSI controller can hold several devices on a single chain.SCSI connectors are used in high-end servers.

SCSI, which stands for Small Computer System Interface, is a set of standards for physically connecting and transferring data between computers and peripheral devices.

The SCSI standard has typically been used in enterprise environments due to its ability to support multiple devices on a single bus and its high performance compared to other interface types available during its prime use years. It is less common to find SCSI used in laptops or tablets, as these devices generally rely on newer, more compact connection technologies like USB or Thunderbolt.

True or False? When shooting OTS shots of two actors / subjects speaking to each other, it is best to place the camera(s) over the same shoulder of each subject (i.e. over both of their left shoulders or both of their right shoulders).

Answers

Answer:True

Explanation: when the camera is placed over the same shoulder of the subjects it enables clear picturing p

To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifiable economical secure

Answers

Answer:

Secure is the correct answer for the above question.

Explanation:

When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.

Successful Web sites such as StumbleUpon ( www.stumbleupon) and Digg ( www.digg) use ____ by inviting their visitors to vote on recommended Web sites, articles, restaurants, photos, or videos, for example, by submitting links or reviews.

Answers

Answer:

"Crowdsourcing" is the correct answer for the above question.

Explanation:

Crowdsourcing is a term from which any organization advertises the thinks or can get the ideas or solutions for any particular problem.It is a term that refers to the problem to the number of solvers to achieve the result correct and frequent.For example, If anyone wants to prepare the two websites. Then he assigns the works to the number of people and the works done faster with the help of this.The above question states that some websites can be successful with the help of the type of work. They are successful with the help of crowdsourced work. Because it saves time. So the answer is Crowdsourcing.

Final answer:

Successful websites like StumbleUpon and Digg use recommendation algorithms to present personalized content to users, which are based on their previous interactions and behaviors on the site.

Explanation:

Successful websites like StumbleUpon and Digg utilize recommendation algorithms by inviting their visitors to vote on or review recommended Web sites, articles, restaurants, photos, or videos. These algorithms are computer programs integrated into social media platforms, e-commerce sites, and various digital applications that analyze users' past behavior to predict and influence their future choices. The more a user interacts with certain types of content, the more the algorithm learns about their preferences, and this data is used to personalize the content that is presented to them. Therefore, by modifying their recommendation algorithms, platforms can better deliver content they presume users will enjoy, which is crucial for media industries aiming to predict audience preferences.

A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file server. A technician suspects that the group policy setting is incorrect. Which command can the technician use to verify the group policy settings?

Answers

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

rstrui (System Restore tool will run), runas (using different permission to run a tool or program), tasklist (currently running programs are showngpupdate (Group policies are refreshed)gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

Final answer:

To verify group policy settings for a user's home directory redirection, a technician can use the 'gpresult' command to identify applied policies or errors.

Explanation:

If a technician suspects that the group policy setting is incorrect for a user's home directory redirection in Active Directory, they can use the Resultant Set of Policy (RSoP) or the gpresult command to verify the group policy settings. For example, running the command gpresult /R in the Command Prompt will provide a summary of the group policy settings that are applied to the user's account and the computer. If the home directory settings are not being applied as expected, the gpresult output will help identify which policies are being applied or if there are any errors in the application of policies that need attention.

What is the name given to the software testing technique, which basically consists of finding implementation bugs using malformed/semi-malformed data injection in an automated fashion?

Answers

Answer:

Fuzz testing

Explanation:

Fuzz testing technique was developed by Professor Barton Miller and his students in the year 1989 at the University of Wisconsin Madison. This Fuzz testing technique is used in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

Answer:

Fuzz testing is the answer.

Explanation:

Fuzz testing is a testing technique that is implemented to identify security vulnerabilities or coding errors in networks, Operating systems (OS) or software.

It involves providing random, unexpected or invalid data to identify bugs at the implementation stage and to discover how the software developed or network responds to such situations (that is, if there is a recovery mechanism in place).

A 1-line script can be written that counts the number of words in two text files and compares the counts: IF [WC -w f1 -eq WC -w f2] THEN ECHO "equal" ELSE ECHO "not equal" Show the order in which the different tasks below must be performed to accomplish the same goal using a GUI.

Answers

Answer:

Hi Salhumad! A GUI for comparing 2 files would have select buttons for choosing the 2 files and a "Compare" button to compare the 2 files once they have been selected.

Explanation:

Your question is giving you most of the answer itself. The 1-line script counts the number of words in two text files and compares the results. Using a GUI, you would have a "select file" chooser button on one side of the screen to allow user to select the first file, and another "select file" button for the user to select the second file for comparison. Another button would be on the screen that would say "Compare files", which once you click, can invoke the one-line script already provided to you in the question. You can put error handling to only call the compare files code once both files are selected.

Drag the correct type of update to its definition.
PRL
PRI
Baseband
The connection between a mobile device and radio tower
The chip that controls the radio frequency waves within a device
A list of radio frequencies

Answers

Answer:

   

Explanation:

Baseband: The chip that controls the radio frequency waves within a device, is a range before to become in a different frequency range, for example, an audio frequency when is transmitted is a radio frequency.

The Preferred Roaming List (PRL) is a list of radio frequencies, and a database there residing in a wireless device like a cellphone.

PRI The chip that controls the radio frequency waves within a device.

______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP/IP family of protocol standards, including use for VPNs.

Answers

Answer:

"IP security" is the correct answer for the above question.

Explanation:

"IP security" is a set of rules or protocols which are used for the communication of the network.It is a protocol that is used to encrypt the data which is needed to transfer on the network.It provides security for the communication and it encrypts the data which is needs o transfer on the network.The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.

Answer:

The correct answer is "IP Security".

Explanation:

The IP means internet protocol security .in the network layer of the OSI model Internet protocol is used. The main objective of IP Security provides reliable communication when the packets are sent across the network.

The IP Security provides the cryptographic authentication and encryption framework for security development in the Transmission Control Protocol/Internet Protocol family of the protocol standard. The  IP Security provides security in the encryption process of the cryptography.

A network uses category 3 cabling. It needs to be upgraded so that it can support faster 1 Gbps applications. In this situation what would be the minimum cable needed to accomplish this?

Answers

Answer:

The answer is "Category 5 cable".

Explanation:

It is also known as Cat 5 or class 5, but many of us consider it just "Ethernet wire". It was established in the early 1990s, which was included by the Electronics Industry group and the Telecom industry Association. It uses a twisted pair cable, which is used for carrying signals.  

It supports up to 100 MHz capacity and can be used for 10Base-T, 100Base-TX, or perhaps 1000Base-T Gigabit. It is the right solution for four twisted pairs of copper cable that attached to the RJ-45 connector.

Which operating system is often found on tablets but not on smartphones?
Android
iOS
Linux
Windows

Answers

I’m pretty sure it’s Linux
The answer is, Linux.

The Connected Computer Click the Statement on the left, then click the Term on the right that completes the statement. Statement _____ does not allow changing service or bandwidth because a Web site allows illegal media sharing. Buying and selling products via electronic channels such as the Internet is called _____ . You use ____ when your telephone calls travel over the Internet instead of using traditional phone systems. With _____, you can access storage and applications over the Internet. The Internet connects millions of computers connected through millions of ____ worldwide. A.Term Net B.neutrality networks C.e-commerce D. VoIP E. cloud computing

Answers

Answer:

1. Net neutrality

2.E-commerce

3.VOIP

4.Cloud Computing

5.Networks

Explanation:

Notable from the above is net neutrality that holds the principle that internet service providers should never block out out or limit certain content or application on the internet and therefore all internet traffic should be treated equally regardless of the source if the traffic. This ensures there is impartiality on the internet and we are all on level playing ground.

Final answer:

The answers to the matching exercise are: (1) Net neutrality (2) e-commerce (3) VoIP (4) cloud computing (5) networks. These terms relate to the legal, economical, and technical aspects of the internet and web-based technologies.

Explanation:

The student's question appears to be a part of an interactive matching exercise related to the understanding of internet-related terminology. Below are the correct completions for the provided statements:

Net neutrality does not allow changing service or bandwidth because a Web site allows illegal media sharing.

Buying and selling products via electronic channels such as the Internet is called e-commerce.

You use VoIP when your telephone calls travel over the Internet instead of using traditional phone systems.

With cloud computing, you can access storage and applications over the Internet.

The Internet connects millions of computers connected through millions of networks worldwide.

Other Questions
g 4. You start a dog walking business. Define to be a random variable denoting how many dogs you walkthis week. The probability mass function (pmf),f(x), o'is defined as follows: 0 1 2 3 4 5 6 7 P(X = x) 0.14 0.12 0.15 0.23 0.18 0.09 0.08 0.01 (a) Verify that f(x) is a valid probability mass function. (b) Find the probability that you will walk at least two dogs this week. (c) Compute the expected number of dogs you will walk this week. (d) Compute the expected value of X2. (e) Compute Var[x] = E(X2) (E[X])2. A motorcycle with two riders weaves dangerously between parked cars in a crowded shopping center parking lot. As the motorcyclists dart between cars, they confront a moving car. Both the car and motorcycle veer to avoid a head-on collision. The motorcycle strikes the side of the oncoming car, throwing riders to the ground. The car stops abruptly, throwing the driver into the windshield. Nearby, Lisa and Paul (two college students) hear the sound of crunching metal and blaring horns and decide to join the small group that has gathered? The lungs are ____.Connected by the mediastinumSeparated by the mediastinum Divided into nine lobesDivided into seven lobes A machine makes 300 boxes in 15 minutes which expression equals the unit rate in box per hour Calculate the speed of sound at 288 K in hydrogen, helium, and nitrogen. Under what conditions will the speed of sound in hydrogen be equal to that in helium? Vicky Rogers works in the accounts payable departmentat HDU, Inc. When checks are returned to the company for incorrectvendor addresses, she is supposed to research them, correct them, and then forward them to the proper address. Instead,Rogers decided to convert some of the returned checksfor her own use. Based on the information provided, what type of check tampering scheme is this likely to be? a. Forged maker b. Forged endorsement c. Concealed check d. Authorized maker Adjusting items:1. A physical inventory shows supplies on hand of $3,000 at year end. 2. The prepaid rent covers December 2016 thru March 2017 rents. 3. December depreciation on equipment is $11,000 per month. 4. At year end Wages of $10,000 were earned but unpaid.Use this information to prepare the general Journal entry Choose the statement in each pair that makes sense.a) La muchacha come un bocadillo de jamn y queso.b) La muchacha come un bocadillo de pizza. Which of these is a banking activity of the Fed? Which label belongs in the area marked x? the temperature of a sample of copper increased by 23.0 C when 265 J of heat was applied. What is the mass of the sample? A single water molecule were oriented such that its dipole moment (magnitude 6.186 10 30 Cm is along a z axis. How much torque does an 8500 N/C electric field exert on the dipole if the field lies in x z -plane, 42 above the x -axis? Water on Earth was (a) transported here by comets; (b) accreted from the solar nebula; (c) produced by volcanoes in the form of steam; (d) created by chemical reactions involving hydrogen and oxygen shortly after Earth formed. Im the slope-intercept form, what variable is used to represent the y-intercept? Y=Mx+bA. M is the y-interceptB. B is the y-intercept The length of a rectangle is two more than four times the width if the perimeter is 54 inches what are the length and width? How do you do this please its due tomorrow Suppose a statistics teacher wants to know whether the numberof hours students spend studying in a group affects the finalcourse grade. In each part, explain whether the research methoddescribed is a randomized experiment or an observationalstudy.a) Each student keeeps a log of the hours he or she spendsstudying in a group and reports the total after the course iscompleted.b) Students are randomly assigned to study groups. The teachertells each group how often to meet. This varies from one hour theday before each exam to two hours per week.c) Students voluntarily join groups based on how often thegroups will meet. The groups are designated as meeting weekly,meeting only before exam,s or meeting whenever enough members feelthat it is necessary. Why do equivalent ratios form a straight line when graphed? Which equation does not support the fact that polynomials are closed under multiplication? 11=11/xx=11x=x1/33=1 Out of each 100 products , 93 are ready for purchase by customers. If you selected 20 products, what would be the expected mean number that would be ready to purchase by customers?