The first PCI bus has a 32-bit data path, supplied 5 V of power to an adapter card, and operated at what frequency?
a. 88 MHz
b.64 MHz
c. 16 MHz
d. 33 MHz

Answers

Answer 1

Answer:

D. 33mhz

Explanation:

The PCI is short for peripheral component interconnect. This has speed and was made by Intel. At first it was made to be 32 bits and with a speed that 2as up to 33 megahertz. But other versions that followed had 64 bit and 66 megahertz.

This bus can stay with other buses and can work in synchronous or the asynchronous mode.


Related Questions

Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based

Answers

Answer:

The modified program is as follows:

user_input = input()

short_names = list(user_input.split(" "))

short_names.pop(0)

short_names[-1] = "Joe"

print(short_names)

Explanation:

This gets the user input

user_input = input()

This converts input to list

short_names = list(user_input.split(" "))

This removes the first item of the list

short_names.pop(0)

This updates the last item to "Joe"

short_names[-1] = "Joe"

This prints the updated list

print(short_names)

Write a public static method named print Array, that takes two arguments. The first argument is an Array of int and the second argument is a String. The method should print out a list of the values in the array, each separated by the value of the second argument.
For example, given the following Array declaration and instantiation:
int[] myArray = {1, 22, 333, 400, 5005, 9}; printArray(myArray, ", ") will print out 1, 22, 333, 400, 5005, 9
printArray(myArray, " - ") will print out 1 - 22 - 333 - 400 - 5005 - 9

Answers

Answer:

Here is the output.

Explanation:

import java.util.Arrays;  

public class Main{  

   public static void main(String[] args){        

       int[] array={43,42,23,42,4,56,36,7,8,676,54};

       System.out.println(Arrays.toString(array));

       printArray(array,"*");

       System.out.println(""+getFirst(array));

       System.out.println(""+getLast(array));

       System.out.println(Arrays.toString(getAllButFirst(array)));

       System.out.println(""+getIndexOfMin(array));

       System.out.println(""+getIndexOfMax(array));

       System.out.println(Arrays.toString(swapByIndex(array, 1,2)));

       System.out.println(Arrays.toString(removeAtIndex(array,3)));

       System.out.println(Arrays.toString(insertAtIndex(array,3,65)));

   }  

   //---1----

   public static void printArray(int[] arr, String sep){  

       for(int i=0; i<arr.length-1;i++){  

           System.out.print(" "+arr[i]+" "+sep);  

       }  

       System.out.println(" "+arr[arr.length-1]);  

   }  

   //---2----  

   public static int getFirst(int[] arr){  

       return arr[0];  

   }

   //---3----  

   public static int getLast(int[] arr){  

       return arr[arr.length-1];  

   }  

   //---4-----  

   public static int[] getAllButFirst(int[] arr){  

       int[] anotherArray=new int[arr.length-1];  

       for(int i=1; i<arr.length;i++){  

           anotherArray[i-1]=arr[i];  

       }

       return anotherArray;

   }

//---5------  

   public static int getIndexOfMin(int[] arr){  

       int index=0;  

       int min=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(min>arr[i]){  

               min=arr[i];  

               index=i;  

           }  

       }

       return index;  

   }  

   //---6------  

   public static int getIndexOfMax(int[] arr){  

       int index=0;  

       int max=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(max<arr[i]){  

               max=arr[i];  

               index=i;  

           }  

       }  

       return index;  

   }  

   //---7------  

   public static int[] swapByIndex(int[] arr, int a , int b){  

       int temp=arr[a];  

       arr[a]=arr[b];  

       arr[b]=temp;  

       return arr;  

   }  

   //---8------  

   public static int[] removeAtIndex(int[] arr, int index){  

       int[] anotherArray = new int[arr.length - 1];  

for (int i = 0, k = 0; i < arr.length; i++) {  

if (i == index) {  

continue;  

}  

anotherArray[k++] = arr[i];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---9------  

   public static int[] insertAtIndex(int[] arr, int index, int element){  

       int[] anotherArray = new int[arr.length + 1];  

for (int i = 0, k=0;k < arr.length+1; k++) {  

if (k == index) {  

anotherArray[k]=element;  

               continue;  

}  

anotherArray[k] = arr[i++];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---10------  

   public static boolean isSorted(int[] arr){  

       for(int i=0; i<arr.length-1;i++){  

           if (arr[i+1]<arr[i]){  

               return false;  

           }  

       }  

       return true;  

   }  

}

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

Discuss any five positive and five Negative impact
of ICT on society​

Answers

Answer:

The technology of information communication has the capacity to transform society. It plays a key part and provides the infrastructure needed to achieve each of the United Nations Sustainable Development Goals. It also allows financial integration by m-commerce and lets people connect instantly to millions.

ICT has a particularly important impact on business. It allows people to exchange knowledge and advice immediately and establish a website or online shop at a low cost, thus reducing the obstacles to starting a business dramatically. As such, it is a major factor in change and the maturity of ICTs is strongly connected to economic growth.

Explanation:

Effects of ICT

As a human beings, we are always associated in our everyday life with many essential things. The use of ICT equipment in our lifestyle has simplified many time-consuming calculations and difficult tasks, and social contacts have been strengthened. ICT has affected life by enhancing the timely distribution of media information and improved home and workplace communications via social networking, e-mail, etc.

The quality of human life has been greatly improved by ICT. For example, it could take a few days for a letter to come to the recipient, but a single minute for an e-mail to reach. ICT offers a broader understanding and information for each facility  24 Hrs X 7 days. In the following, ICT affects different fields of daily living.

Positive Impacts of ICT:

As domestic and home businesses.As social connectivity.As E-learning/ As educationAs for shopping/tradingAs for banksAs a job/jobs

Negative Impacts of ICT:

Face-to-face interaction reduced.Social Decoupling.Physical activity/health issues reduced.Cost.

Write a python program that will accept monthly salary amounts greater than zero but less

than or equal to 400,000.00 until the user enters the character ‘e’. After the user

enters the character ‘e’, calculate the net pay of all salaries by deducting income tax at

a rate of 25%, pension of 5% and housing contribution of 2% from each salary

entered. Additionally, print the number of salaries that were entered in the program

along with the number of salaries that exceed 300,000.00

Answers

Answer:

b=0

c=0

lol=list()

while True:

   salary=input("Enter your salary: ")

   if salary=="e" or salary=="E":

       print("Thankyou!!")

       break

   else:

       a=int(salary)

       if a>=300000 and a<=400000:

            c=c+1

       if a<0 or a>400000:

           print("Your salary is either too small or too big ")

       if a>0 and a<=400000:

           a=a-(25/100*a)-(5/100*a)-(2/100*a)

           lol.append(a)

           b=b+1

           if a>=300000:

                c=c+1

print(lol)

print("The number of salaries entered is: "+ str(b))

print("The number of salaries that exceeded 300000 is: "+str(c))

Which of the following Python methods is used to perform hypothesis testing for a population mean when the population standard deviation is unknown?

a. uttest(dataframe, null hypothesis value)
b. ztest(dataframe, null hypothesis value)
c. prop_1samp_hypothesistest(dataframe, n, alternative hypothesis value)
d. ttest_1samp(dataframe, null hypothesis value)

Answers

Answer:

B: ztest(dataframe, null hypothesis value)

The Python method that is used to perform a test of hypothesis for a population mean with an unknown population standard deviation is d. ttest_1samp(dataframe, null hypothesis value).

A t-test is normally applied when the population standard deviation is not known.  The researcher will use the sample standard deviation.

While the z-test can also be used in Python to perform hypothesis testing with a known population standard deviation and a sample size that is larger than 50, only the t-test can be applied with an unknown population standard deviation or a sample size less than 50.

Thus, the only Python method to carry out hypothesis testing with unknown population standard deviation is the t-test, which is given in option d.

Learn more about hypothesis testing at https://brainly.com/question/15980493

A) Why should assembly language be avoided for general application development?
B) Under what circumstances would you argue in favor of using assembly language for developing an assembly language program?
C) What are the advantages of using a compiled language over an interpreted one?
D) Under what circumstances would you choose to use an interpreted language?

Answers

Answer:

(A) Assembly language should be avoided for general application development for the following reasons:

i. It is difficult to write assembly language codes. It does not contain many tools and in-built functions to help with the development of these applications.

ii. Since general application development requires that the application be machine independent, writing such applications in assembly language (which is a low level, machine dependent language) might be a pain as it would require that the writer have sufficient knowledge of hardware and operating systems.

(B) The following are the circumstances where assembly language should be used:

i. Assembly languages are low level languages that are very close to machine languages that the machine or processor understands. Therefore, when writing codes for programs that should directly communicate with the processor, assembly language should be used.

ii. Since assembly language codes are machine dependent, when there is a need to write applications for target machines, they should be used.

iii. If there is a need to have very great control of certain features of your application and resources to be consumed such as amount of RAM, clock speed e.t.c, assembly languages are a great tool.

(C) Some of the advantages of compiled language over an interpreted language are:

i. Compiled languages are way faster than interpreted languages because the compiled languages are converted directly into native machine codes that are easy for the processor to execute. Put in a better way, with compiled languages, codes are compiled altogether before execution and therefore reduces the overhead caused at run time. Interpreted languages on the other hand executes codes line after line thereby increasing the overhead at run time.

ii. Since codes are compiled first before execution in compiled languages, nice and powerful optimizations can be applied during the compilation stage.

(D) Interpreted languages could be chosen over compiled languages for the following reasons:

i. Interpreted languages are much more flexible and easier to implement than compiled languages as writing good compilers is not easy.

ii. Since interpreters don't need to convert first to intermediary codes as they execute these codes themselves, programs built with interpreters tend to be platform independent.

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
email address
web address
UNC path
O All will be automatically converted,

Answers

Answer:

d. All will be automatically converted.

Explanation:

A hyperlink is a link created in one document and that leads to another document mostly by clicking on that link. In Microsoft Outlook, some text formats are automatically converted to hyperlinks which are shown by first underlining the text and then changing the text color to blue. Some of the text formats that are turned to hyperlinks are:

i. email addresses

ii. web addresses

iii. UNC path: This is a path specifying the location of a particular document or resource on a computer or server. It has the following format:

\\name--of--server\resource-path-name

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.

Answers

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

How does a junction table handle a many-to-many relationship?

by converting the relationship to a one-to-one relationship
by moving the data from the source table into the destination table
by directly linking the primary keys of two tables in a single relationship
by breaking the relationship into two separate one-to-many relationships

Answer: 4
by breaking the relationship into two separate one-to-many relationships

Answers

Answer:

two" (and any subsequent words) was ignored because we limit queries to 32 words.

Explanation:

please mark as brainliest

Answer:

By breaking the relationship into two separate one-to-many relationships

Explanation:

I just did it / edge 2021

Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0 Volume for 4.5, 2.1, 3.0 is: 9.45 Relevant geometry equations: Volume

Answers

Answer:

Explanation:

The following is written in Java. It takes in the three values as parameters and then uses the formula for calculating the volume of a pyramid. Finally, returning the volume to the user. A test case has been provided in the main function and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       double output = calc_pyramid_volume(4.5, 2.1, 3.0);

       System.out.println(output);

   }

   public static double calc_pyramid_volume(double base_length, double base_width, double pyramid_height) {

       double volume = (base_length * base_width * pyramid_height) / 3;

       return volume;

   }

}

Which ONE of the following role players provides technical backup, trouble shooting and
computer literacy training?
1. Parents
2. Teachers
3. ICT Coordinator
4. Subject specialist​

Answers

Answer:

C, ICT coordinator

Explanation:

 

ICT Coordinator provides technical backup, trouble shooting and computer literacy training.

ICT Coordinator

This individual seems to be in charge of such gear as well as applications, as well as broadband connections.

This same coordinator also assists overall ICT policy development in schools, such as the formation of an ICT management committee, responsibility division, as well as communication with stakeholders.

Thus the response above i.e., "option 3" is correct.

Find out more information about ICT Coordinator here:

https://brainly.com/question/25168859

An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.

Answers

An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.

What is electronic spreadsheet?

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.

Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

You might also keep in mind that while exporting data into a spreadsheet, some data types might change.

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Thus, the answer is electronic spreadsheet.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

A group of computer scientists wants to create a fixed-length compression algorithm. The simplest way to achieve compression is to use a fixed-length code generator. The idea behind this type of code generator is to assign a fixed-length bit sequence to each symbol of the alphabet. As part of this group of computer scientists, your goal is to write a program to determine the alphabet used by the message to be compressed (set of different characters in the input message), and the frequency of each symbol in the alphabet, using conditionals, loops, and arrays.

Answers

Answer:

Here the code is given as follows,

Explanation:

OUTPUT:  

Message: AAAABBBCCDDDDDDDE  

Number of symbols in the alphabet = 5  

Characters in the alphabet = A,B,C,D,E  

Number of bits per symbol = 3  

Histogram showing the frequency of the symbols in the alphabet  

A | ****  

B | ***  

C | **  

D | *******  

E | *

If your goal is for users to read information, create a web __________.

Answers

Answer:

Learn, I think hope this works?

Explanation:

the answer would be learn

Exam Lesson Name: Introduction to Design Technology
Exam number. 700796RR
> Exam Guidelines
Exam Instructions
Question 8 of 20 :
Select the best answer for the question
8. Cycling through the design process to create several models that incrementally improve a solution is called what?
O A. Six Sigma
B. Success criteria
C. Just-in-time production
D. Iterative design
Mark for review (Will be highlighted on the review page)
Type here to search
O
Bi
S

Answers

Answer:

D. Iterative design

Explanation:

An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.

In an iterative design process, the following steps are adopted;

1. A prototype of the product is first created and tested by the manufacturer.

2. The product is then evaluated to check for any defect or flaw.

3. The defect or flaw is fixed through a refining process.

4. The previous steps are repeated incrementally until an improved version of the product is created.

Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.

Answer:

Iterative Design

Explanation:

A. It seeks to figure what it defective

B. It reaffirms if all requirements are met to solve a problem

C. It's main goal was to avoid excess products that might not end up making sales in the near future

D. Making several revision on problems to take out an efficient solution

D makes the most sense here.

Jill is configuring the AutoArchive feature in Outlook 2016. What is the default setting in relation to when AutoArchive
will run?
o 7 days
0 14 days
30 days
O Never

Answers

Answer:

(b) 14 days

Explanation:

In the presence of thousands of mails each day or week, controlling what items to keep in an archive for cleaning up purposes becomes important. To do this, Outlook comes with an option called AutoArchive. The default setting in relation to when AutoArchive will run is 14 days. To change this setting, user will need to do the following:

i. Navigate to File  > Options > Advanced

ii. Under the AutoArchive menu, click on the AutoArchive settings

iii. Change the settings however way they want.

Answer:

That's correct it's 14 days

Explanation:

:) hope it helps

What is food technology​

Answers

Answer:

is the application of food science to the selection, preservation, processing, packaging, distribution, and use of safe food. Related fields include analytical chemistry, biotechnology, engineering, nutrition, quality control, and food safety management.

Explanation:

Anyone wanna play league of legends, i play top and mid

Answers

Answer:

u get work

Explanation:

explain any two factors to consider when classifying computer systems​

Answers

Answer:

The following classifications can be made of the computer systems:

1. According to size.

2. Functionality based on this.

3. Data management based. 

Explanation:

Servers:-

Servers are only computers that are configured to offer clients certain services. Depending on the service they offer, they are named. For example security server, server database.

Workstation:-

These are the computers which have been designed mainly for single users. They operate multi-user systems. They are the ones we use for our daily business/personal work.

Information appliances:-

They are portable devices that perform a limited number of tasks such as basic computations, multimedia playback, internet navigation, etc. They are commonly known as mobile devices. It has very limited storage and flexibility and is usually "as-is" based.

my iphone s6 is plugged in but isnttttt charging and the chager works on my ipad waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Answers

Answer:

Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.

How laggy is you're game cause I even lag in offline games this is just a random question. ​

Answers

Answer: its bad

Explanation:

Answer:

Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.

you recieve a phone call from the sterlization monitoring company informing you that the last spore test you sent has failed. What should you check to determine the possible cause

Answers

Answer: The type sterilization that was used and how well it was performed

Explanation:

If there's a phone call from the sterilization monitoring company that the last spore test sent has failed, to determine the possible cause, I'll have to type sterilization that was used and how well it was performed.

The sterilization technique used will be analysed, and there'll also be a check for possible human errors. Once thus is done, the possible reason for the failure of the last spore that was sent can then be determined.

Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
coworker for immediate handling. What should she do?
O Configure a response for external senders.
O Configure a response for internal senders.
O Only send during a specific time range.
O Configure an Automatic Reply Rule.

Answers

Answer:

Configure an Automatic Reply Rule

Explanation:

The Rule feature in Outlook enables a user to respond immediately to a message, to move a message, or to flag a a message.

The Automatic Replies (Out-of-Office) feature can also be used to let colleagues inside the organization know when a user is out of office and the arrangements that they have made

Also, Using the Out-of-Office dialogue box, under the Files tab, Automatic Replies can be configured using the Rules button to add a rule that forwards all messages from the particular client to the email address of a coworker for them to take care of immediate, while sending an automatic reply to the sender about being out of office and that the mail has been forwarded to a coworker to handle

Therefore, Kylee can configure an Automatic Reply Rule

I NEED HELP I'LL GIVE BRAINLEST

Direction can be applied to animations but not transitions.


True

False

Answers

Answer: True

Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.

Answer:

I think it's true but I'm not 100% sure.

१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :
(क) सुशासन र विकास

Answers

Answer:

n

Explanation:

Answer:

kkkkkkkkikkkkkkkkkkkiikkiiii

A pointer can be used as a function argument, giving the function access to the original argument.
A. True
B. False

Answers

Answer:

True

Explanation:

A pointer can be used as a function argument, giving the function access to the original argument.

You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation data. The following maybe true:
a. This is an instance of overfitting.
b. This is an instance of underfitting.
c. The training was not well regularized.
d. The training and testing examples are sampled from different distributions.

Answers

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?

Answers

Answer:

As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.

Explanation:

Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.

Other Questions
please answer both questions thanks Anquan's account balance is $29.96, and Will's account balance is -$29.96. Which of the following is true You and your friends decide to go to the recreation center to play pickup basketball. You decide to play the game 21 where a layup equals 1 point and a jump shot equals two points. You made 11 layups and need to decide how many jump shots you need to make in order to win Remember that you must not go over 21 points or you lose. Considering the temperature vs. time graph below, how does the temperature at the beginning of a change of statecompare with the temperature at the end of the change? Helppp meee please!! what is the simplify answer to 4 3/5 + 15 1/5 = You will purchase some cds and dvds. If you purchase 13 cds and 5 dvds, it will cost you $96.70; if you purchase 5 cds and 12 dvds, it will cost you $134.50. Write and solve a system of equations to solve. What is the solution to the following system of equations?[3x-2y = 1216x-4y = 24O It has infinitely many solutions.It has no solution.It has one solution (2, -3).It has one solution (4,0). how did hongwu come to power? If x^4-y^4=45 and x^2-y^2=5, then x^2+y^2=?A. 9B. 15C. 20D. 40E. 50 PLEASE I NEED THE ANSWER DON'T IGNORE MY QUESTION!!! hi pls help me out with this When is the economy important to voters?A. when there are few other national problemsB. when American lives are being lost in warC. when it threatens their jobs or lifestylesD. when they see successful foreign nations If a = 85, what does b equal? Across5 The opposite of boring is ...6 You see films there.8 Your dad.9 Canada, the USA and Mexico.Down1 This has a keyboard.2 Not shorter.3 You get one in the post.4 You do this with music.6 You use this to take photographs.7 By yourself. what was the purpose of chinampas for the aztecs Signature Appliance Group decided to remove the grill unit from the ovens it sells in South America after customers complained they preferred to grill outside and would never use this feature. Which environmental force caused the company to change its product 12. How many sixteenth notes would be in a whole note? which angles are complementary to 3 ? Select all that apply The answer ISNT -9/5,3.Don't have to explain, but if u want then to ahead.Thank you! :)