why are media conductors needed in computer network?​

Answers

Answer 1

Answer:

Transmission media connectors attach directly to the medium itself and serve as the physical interface between cabling and network nodes.

Explanation:

Answer 2

Answer:

masamstha 31 is correct hope it's help you have a good day


Related Questions


Bill is pushing a box with 10 N of force to the left, while Alice is pushing the box with 30 N of force to the right. What is the
net force?

Answers

Answer:

Net force = 20 N

Explanation:

Given that,

Force acting on the left = 10 N

Force acting on the right = 30 N

Let right side is positive and left side is negative. Let the net force acting on the box is F. So,

F = -10+30

F = 20 N

So, the net force on the box is 20 N and it is in right side.

Explain one function that is used in a formula.​

Answers

Answer:

SUM function

Explanation:

in microsoft excel, the sum function takes all of the specified cells and adds their values together. for example, =SUM(A2:A10) adds the values in cells A2:10.

Choosing a theme in slides gives your presentation
a cartoon background
a theme song
the same background and text styles for a consistent look
a variety of styles in many slides

Answers

The same background and text styles for a consistent look is the theme in slides gives your presentation.

Thus, Techniques and Personal Presentation are the two main divisions of the formal presenting of information.

The planning, presentation, and practice of verbal and non-verbal communication are these two interrelated components.

This article outlines some of the major concepts related to presentations and explains what a presentation is.

Thus, The same background and text styles for a consistent look is the theme in slides gives your presentation.

Learn more about Presentation, refer to the link:

https://brainly.com/question/1493563

#SPJ1

How does Harrison react to the news that Katherine has to walk 800m to the bathroom? in hidden figures

Answers

Answer: Your welcome!

Explanation:

Harrison is outraged at the news that Katherine has to walk 800m to the bathroom. He angrily tells the building manager that this is unacceptable and demands that a bathroom be provided for the female employees. He also demands that Katherine and the other female employees be allowed access to the same facilities as their male counterparts. He then suggests that the NASA official in charge of the building should be reprimanded for allowing this situation to occur.

PLEASE HELP!!!
How can programmers use functions to create their own abstractions?

Answers

Answer:

by invoking the function.

please mark as brainliest if this helped

Peace

Tell me 2-6 computer parts that are inside a computer.

Spam answers will not be accepted.

Answers

Answer:

Memory: enables a computer to store, at least temporarily, data and programs.

Mass storage device: allows a computer to permanently retain large amounts of data. Common mass storage devices include solid state drives (SSDs) or disk drives and tape drives.

Input device: usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer.

Output device: a display screen, printer, or other device that lets you see what the computer has accomplished.

Central processing unit (CPU): the heart of the computer, this is the component that actually executes instructions.

Explanation:

Form letters are appropriate as persuasive messages sent to thousands of readers.T/F

Answers

Form letters, also known as form emails, are not appropriate for persuasive messages sent to thousands of readers. In the context of business communication, a form letter is a letter that is written in advance to serve a particular purpose, such as responding to a customer complaint or informing clients of new products.

It is a pre-written template that can be used to convey a message to many recipients at once.The problem with form letters is that they lack personalization and customization. A persuasive message is supposed to appeal to the recipient's specific needs and interests.

A form letter, on the other hand, is generic and impersonal. It does not acknowledge the recipient's unique situation or perspective, nor does it address their concerns and objections. For these reasons, form letters are not effective for persuasive messages sent to thousands of readers.

To know more about appropriate visit:

https://brainly.com/question/9262338

#SPJ11

A well-known production is making a documentary film titled “The Dwindling Population of Grizzly Bears in the United States.” Which objective is most likely the primary objective for making the film? A. getting recognition B. telling a story C. spreading awareness D. earning profits

Answers

Answer:

C. spreading awareness

Explanation:

According to the given question, the most likely primary objective of a well-known production company making a documentary film titled “The Dwindling Population of Grizzly Bears in the United States" is to generate and spread awareness of the possible extinction of the grizzly bears in America.

With their production, they would expose the dangers facing the grizzly bears and also educate the general public so they could save the grizzly bears.

what considerations and specific approaches would it take to ensure that memory is effectively managed in the software application,

Answers

When it comes to ensuring that memory is effectively managed in a software application, there are a number of considerations that need to be taken into account. These include factors such as the size and complexity of the application, the types of data and operations it will be handling, and the specific requirements and limitations of the target hardware and operating system.


In order to effectively manage memory in a software application, there are a number of specific approaches that can be taken. These may include techniques such as memory pooling, garbage collection, and memory mapping, as well as strategies for optimizing memory usage and minimizing memory leaks and other common issues.
Ultimately, the key to effectively managing memory in a software application is to carefully consider the specific requirements and limitations of the target environment, and to implement a combination of techniques and approaches that are tailored to the unique needs of the application in question. By doing so, developers can ensure that memory is effectively managed, helping to improve performance, reduce crashes and errors, and provide a more stable and reliable user experience overall.
To ensure that memory is effectively managed in a software application, some important considerations and specific approaches include:
1. Data structures: Choose appropriate data structures for storing and organizing data, considering their memory usage and access time.
2. Memory allocation: Allocate memory dynamically when necessary, and avoid using excessive global or static variables.
3. Garbage collection: Implement garbage collection algorithms to automatically reclaim unused memory, such as reference counting or mark-and-sweep methods.
4. Memory pooling: Use memory pooling techniques to reuse pre-allocated memory blocks for repetitive tasks, reducing memory fragmentation and allocation overhead.
5. Caching: Implement caching strategies to store frequently accessed data in memory, improving performance and reducing the need to repeatedly allocate and deallocate memory.
6. Memory profiling: Regularly analyze the application's memory usage with profiling tools to identify and address memory leaks or inefficiencies.
7. Code optimization: Optimize code to minimize memory usage, by refactoring or applying best practices for memory management.
By taking these considerations and applying specific approaches, you can ensure that memory is effectively managed in your software application.

To learn more about Application Here:

https://brainly.com/question/29353277

#SPJ11

To ensure that memory is effectively managed in a software application, you should consider the following approaches:

1. Efficient memory allocation: Allocate memory only when necessary and release it as soon as it's no longer needed. Use appropriate data structures and algorithms that minimize memory usage.

2. Memory leak prevention: Identify and fix memory leaks by regularly reviewing the code, using memory analysis tools, and performing proper testing.

3. Memory optimization techniques: Implement caching, data compression, and memory pooling to optimize memory usage. Choose appropriate data types and data structures to store data efficiently.

4. Garbage collection: Use garbage collection mechanisms provided by your programming language or platform, if available, to automatically reclaim unused memory.

5. Monitoring memory usage: Monitor memory consumption during the development and production stages. Set up alerts to notify you when memory usage reaches a critical level.

6. Scalability: Design the application to handle increasing memory requirements as the number of users or data grows. Consider implementing load balancing and horizontal scaling.

By considering these approaches, you can effectively manage memory in your software application and improve overall performance.

Learn more about Software Application: https://brainly.com/question/28737655

#SPJ11      

     

Which attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data

Answers

Attackers who grant themselves a higher access level, such as administrator, are commonly known as privilege escalation attackers. Privilege escalation refers to the act of gaining elevated privileges on a computer system or network.

This allows the attacker to perform illegal actions, such as running unauthorized code or deleting data. There are various techniques that privilege escalation attackers may employ, including exploiting vulnerabilities in the operating system, misconfigurations, or weak user credentials.

Once the attacker gains administrative access, they have full control over the targeted system and can carry out their malicious activities. It is important for organizations to implement strong security measures, such as regular patching and updates, strong user authentication, and proper access controls, to mitigate the risk of privilege escalation attacks.

To know more about Attackers visit:

https://brainly.com/question/33329734

#SPJ11

Given five points \( A(1,0,2), B(3,1,1), C(4,2,-1), D(2,3,1) \) and \( E(2,3,0) \) in \( \mathbb{R}^{3} \). Use vector methods to answer the following questions. (a) Find the angle \( \angle B A C \).

Answers

Given five points in ℝ³ i.e. A(1,0,2), B(3,1,1), C(4,2,-1), D(2,3,1) and E(2,3,0).We need to use vector methods to find the angle ∠BAC.

Let's start solving the problem

Part 1: Vector representation of AB, AC

First, we need to find the position vectors AB and AC.i.e. AB = B - A, AC = C - A

We have: A(1, 0, 2), B(3, 1, 1), C(4, 2, -1)AB = B - A= (3 - 1)i + (1 - 0)j + (1 - 2)k= 2i + j - kAC = C - A= (4 - 1)i + (2 - 0)j + (-1 - 2)k= 3i + 2j - 3k

Part 2: Vector representation of normal to plane ABC Now, we will find the vector representation of normal to plane ABC as follows.

Normal to plane ABC = AB x AC Where x denotes the cross product of vectors AB and AC

We have: AB = 2i + j - k, AC = 3i + 2j - 3kAB x AC= |i j k|2 1 -13 2 -3|= -5i - 7j - 1kPart

3: Magnitude of vectors AB, AC and AB x AC We will find the magnitude of vectors AB, AC and AB x AC as follows.

Magnitude of vector AB = √(2² + 1² + (-1)²)= √6 Magnitude of vector AC = √(3² + 2² + (-3)²)= √22Magnitude of vector AB x AC = √((-5)² + (-7)² + (-1)²)= √75Part 4: Finding angle BAC

Finally, we will find the angle BAC using the formulacosθ = (AB. AC) / (|AB|.|AC|)cosθ = ((2i + j - k).(3i + 2j - 3k)) / (√6.√22)cosθ = (6 - 1 - 6) / (2√33)cosθ = -1 / (√33)θ = cos-1(-1/√33)θ = 100.23°Therefore, the angle between vectors BAC is 100.23°.Thus, option C is correct.

To know more about Vectors:

https://brainly.com/question/29740341

#SPJ11

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

Write a function called removeEvens to remove all the even numbers from input row array inRowArray, which contains integer numbers. The function removeEvens should use the mod internal function and operate on a row array of any length. Hint: Logical indexing and the double square brackets [] should be used. The mod function should be used to identify even numbers, along with combination with logical indexing, and the empty array operator [] to remove the even numbers. Restrictions: Loops should not be used. Ex: inputRowArray = [1,2,3,4,5] removeEvens( inputRowArray ) produces 1 3 5

Answers

The answer of following function will be:

```python

def removeEvens(inputRowArray):

   return inputRowArray[inputRowArray % 2 != 0]

```

The provided function `removeEvens` takes an input row array called `inputRowArray` and uses logical indexing and the mod function to remove all the even numbers from the array.

In the function, `inputRowArray % 2 != 0` checks for each element in `inputRowArray` if it is not divisible by 2 (i.e., an odd number). This returns a boolean array with True for odd numbers and False for even numbers.

Using this boolean array as a mask, we can apply logical indexing on `inputRowArray` by enclosing it within square brackets `inputRowArray[...]`. This selects only the elements where the corresponding position in the boolean array is True, effectively removing the even numbers from the array.

The resulting array, containing only the odd numbers, is then returned by the function.

Learn more about function:

brainly.com/question/31062578

#SPJ11

What is the output of the following snippet?
my_list =
[[0, 1, 2, 3] for i in range (2) ]
print (my_list [2] [0])

Answers

Answer:

Explanation is being shown in the file that takes you to the link

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

The current business conditions, in which the need for data analysis and product customization are becoming more and more important, are called The Computer Revolution The Scientific Revolution The Fourth Industrial Revolution The Post-industrial Revolution Recall when and how we have used a certain iconset recently. We had to reverse the order of the icons in the iconset in order to favor high numbers reorder the icons properly favor low numbers improve conditional formatting A sudden increase in sales is reported in three districts for a company, which has nine sales territories each divided in two districts. To understand the reasons why the increase has occurred, an Analyst must conducts what type of analysis? Prescriptive Predictive Descriptive Diagnostic Which of the following statements contains a mistake? A sound argument is a deductive argument that is not only valid but begins with premises that are actually true. An uncogent argument is an deductive argument that is either weak or has at least one false premise. A cogent argument is a strong non deductive (inductive in this case) argument that has true premises, and the conclusion would be given the appropriate (probabilistic) support for also being true. An unsound argument is either an invalid argument or a valid argument with at least one false premise. In the Pivot Table tool in MS Excel, the column headers from the data table are called Fields Dimensions Attributes Keys

Answers

In the Pivot Table tool in MS Excel, the column headers from the data table are called Fields.

For the second question, to understand the reasons behind the sudden increase in sales in three districts for a company, an analyst must conduct a Diagnostic analysis. A Diagnostic analysis involves examining data and information to determine the cause or reasons behind a specific event or outcome.

Regarding the third question, the statement that contains a mistake is: "A sound argument is a deductive argument that is not only valid but begins with premises that are actually true." The correct statement would be: "A sound argument is a deductive argument that is not only valid but also has all premises that are actually true." In a sound argument, both validity and truth of premises are required for the argument to be considered sound.


Learn more about Fourth Industrial Revolution: https://brainly.com/question/30193777

#SPJ11

Which of the following is a benefit of using a cloud storage option?
A. It protects your computer from viruses
B. It provides a backup of your data, files and photos
C. You don’t need internet access to retrieve the data

Answers

Answer: It provides backup for your files, data, and photos.

Explanation:

Cloud storage is mainly used on Apple software computers (although if you jailbreak the PC you can get any software you want on it (i.e Toshiba can have an apple software)  so A is automatically true is you are working with an Apple, but in this case it would NOT be true because you are talking about cloud storage. C is just not at all explainable. You need internet for EVERYTHING.

Answer:

B

Explanation:

MS-Word 2016 is the latest version of WORD software. True or False
It's urgent ​

Answers

Answer:

true

Explanation:

Answer: This is True!

I hope you have a nice day

Free association involves writing down one or two key terms to help you remember more key terms.
Please select the best answer from the choices provided
OT
OF

Answers

Answer:

true on ed 2020

Explanation:

Answer:

TRUE THO

Explanation:

Calculates the cost of a hotel reservation and states what type of room the customer will be assigned. Obtain this input: number of people on the reservation number of nights age of oldest visitor pricing rules: visitors over 65 receive a 10% discount. Groups of 1-2 people get assigned a room with a king and sofa bed. Groups of 3-4 people get assigned a room with two queens. Groups of 5+ are not able to stay at the hotel. Output: type of room total cost of reservation based on discount, type of room, # of nights program requirements: use both the switch and if keywords in your program use loops to ensure that the user enters invalid, numeric data as their inputs. If the input is not valid, the program should output a message to the user and ask them to enter the correct value(s). Use a function to calculate the total cost. Use a function to calculate the discount

Answers

The number of people on the reservation, the number of nights they will be staying, and the age of the oldest visitor. To ensure that the inputs are valid, we will use loops to prompt the user to enter numeric data if they input an invalid value.

Based on the number of people on the reservation, we will assign the appropriate type of room. Groups of 1-2 people will be assigned a room with a king and sofa bed, while groups of 3-4 people will be assigned a room with two queens. Groups of 5 or more people are not able to stay at the hotel.If the oldest visitor is over 65 years old, they will receive a 10% discount on the total cost of their reservation. To calculate the discount, we will use a separate function.Finally, we will calculate the total cost of the reservation based on the number of nights, type of room, and any applicable discounts. We will use another function to perform this calculation.The program will use both the switch and if keywords to assign the type of room based on the number of people on the reservation. If the input is not valid, the program will output a message to the user and prompt them to enter the correct value(s). this program will provide a simple and user-friendly way to calculate the cost of a hotel reservation while ensuring that the inputs are valid and that the appropriate type of room is assigned based on the number of people on the reservation.

To learn more about loops click the link below:

brainly.com/question/14390367

#SPJ4

What is the difference between the complete scan and the resident shield?

Answers

A complete scan and resident shield are two types of antivirus scans. The main difference between them is that a complete scan checks all files and folders on your computer, while a resident shield scans only files as they are accessed or modified.

A complete scan is a thorough antivirus scan that checks all files and folders on your computer's hard drive. This scan examines all of your system's files to detect viruses, malware, and other threats that may be present. A complete scan is time-consuming and can take several hours to complete, depending on the size of your hard drive.

As you work on your computer and open or modify files, the resident shield scans the files for malicious code and alerts you if any are found. This type of scan is very useful because it provides immediate protection against threats that may try to infect your computer while you're working on it.

To know more about antivirus visit:

https://brainly.com/question/29356216

#SPJ11

Hakeem is very good at interacting with colleagues both verbally and nonverbally. Which soft skill does this demonstrate?

A. Communication skills
B. Adaptability skills
C. Negotiation skills
D. Problem-solving skills

Answers

The answer would be A

A small software company is starting to work with the AWS Cloud. Which service will allow them to find, test, buy, and deploy software that runs on AWS

Answers

Answer:

Elastic Beanstalk

Explanation:

Elastic Beanstalk: AWS Elastic Beanstalk is an easy-to-use service for deploying and scaling web applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS.

on your newly-installed systemd-based server you want to view log files that pertai tp the systems booting and any error messages. which command would you use on this system to view the desired information?

Answers

Journalctl is the command used on the system to view the desired information

What is journalctl?

A tool called journalctl is used to search and display the logs kept by journald, the logging service provided by systemd.Journalctl is the preferred method of reading log messages processed by journald since journald maintains log data in a binary format rather than a textual format.

Numerous tools are available on Linux-based systems to assist in recording and analysing system logs. Similar to "systemd," a strong programme that collects logs from sources in binary format and enables command-line access to the logs for the user.The "Journald" is a system application from the systemd utility that gathers information in binary format from various logs. It provides a more effective way to manage logs while operating in a similar manner to syslog.

Hence to conclude the Journalctl command is used on the system to view the desired information

To know more on commands in systemd  follow this link:

https://brainly.com/question/29727723

#SPJ4

Which of the following is true about K-Mean Clustering?
1. K-means is extremely sensitive to cluster centroid initializations.
2. Poor initialization can lead to sub-optimal results.
3. Poor initialization can lead to slow convergence.
1 and 2 only
2 and 3 only
1 and 3 only
All of the above

Answers

The option that is true about K-Mean Clustering is options 1 and 3 only:

1. K-means is extremely sensitive to cluster centroid initializations.

3. Poor initialization can lead to slow convergence.

Why is k-means a difficulty for optimization?

The goal of clustering, a vector quantization technique that originated in signal processing, is to divide n observations into k clusters, where each observation belongs to the cluster that has the closest mean (also known as the cluster centroid or cluster centers), acting as a prototype for the cluster.

Therefore, By using a deterministic global optimization technique, the global k-means clustering algorithm overcomes the primary drawback of k-means clustering, which is its sensitivity to the initial placements of the cluster centers.

Learn more about K-Mean Clustering from

https://brainly.com/question/15016224
#SPJ1

b. What is Algorithm? b . What is Algorithm ?​

Answers

\(\huge\purple{Hi!}\)

An algorithm is a procedure used for solving a problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.

An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media. Algorithms typically start with initial input and instructions that describe a specific computation. When the computation is executed, the process produces an output.

Assume the user responds with a 3 for the first number and a 4 for the second number.

answerA = input("Enter a number. ")
answerB = input("Enter a second number. ")
numberA = int(answerA)
numberB = int(answerB)
result = (numberA * numberB) / 2
print ("The result is" , result)
What is the output?
The result is .

Answers

Answer:

The result is 6.

Explanation:

number A is 3 and number B is 4.

4*3/2=6

Describe a situation when you would use a conditional statement in a program. Describe the action that would occur when the conditional statement is true and when it is false.

Answers

Answer:  Conditional statements are just true false statements

Explanation:

Let's say there's a kpop band burglarizing my house and I have a super AI that detects if a kpop band is my house through cameras. What it would do is change a variable "kpopBandInHouse = False" to True. I would then have an if statement next with a custom function:

if kpopBandInHouse == True:

   nukeHouse()

So if the conditional statement is true, it nukes my house. It is false, it does not nuke my house.

Conditional statements let you make a choice depending on certain conditions. These results are defined by one set of conditional statements which contain boolean expressions which are evaluated to a correct or incorrect boolean value, and the further calculation can be defined as follows:

Program Explanation:

Defining a header file.Defining the main method.Defining an integer variable "n" that initializes the value that is "1".Defining a conditional statement that checks "n equal to 1", when it's true it will print the message.  

Program:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int n=1;//defining integer variable n that initlize the value 1

   if(n==1)//defining if block that checks n value equal to 1

   {

   cout<<"Hello World";//print message

   }

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/10714086

Describe a situation when you would use a conditional statement in a program. Describe the action that

which of the following statements about mobile web apps is true? a mobile web app requires the user to login to a web service. a mobile web app only works on certain mobile platforms. a mobile web app resides on the user's device. a mobile web app requires the user to sign onto a web page. users access mobile web apps through their mobile device's web browser.

Answers

The true statement about mobile web apps from the options you provided is option D "Users access mobile web apps through their mobile device's web browser."

What is mobile web apps?

Mobile web apps are platform-independent and can run on any modern mobile web browser regardless of the specific platform. The statement that a mobile web app resides on the user's device is false.

So,  Mobile web apps are run through the user's web browser, not installed locally like native mobile apps. A mobile web app may not always require a user to sign onto a web page. User sign-on is based on app functionality and requirements.

Learn more about  mobile web apps from

https://brainly.com/question/30143420

#SPJ1

Other Questions
Find the frequency range (in Hz) of microwaves, given that it encompasses wavelengths from 1.0 mm to 1.0 m. smallest value ____ Hzlargest value____ Hz Does (1, 2) make the equation y = 4x true? Prove: An odd times an odd equals anodd.(2m + 1)(2n + 1) = [ ? ]mn + ]m +[ ]n + [ ]= 2([ ]mn + m + 1 + 1= odd anyone help me be able hack into internet to help this load quicker been here for like 30 mins now What have you learned from geography give 2-3 sentences? Chemical energy stored in food molecules is released through What company is Home Depot owned by? You roll a 6-sided die. What is P(not even)? Write your answer as a fraction or whole number. in order to abandon popular assumptions, entrepreneurs need a clear ______. What were two significant technological innovations that were used in world war i on the western front?. Which are true statements according to the kinetic molecular theory of matter?Select all that apply. may yall help me with this who thinks friday will be great i do fridays feel like im listening to i spy ny kyle ft lil yaghty A scientist looking to remove oxygen from above a liquid sample pumps nitrogen into a sealed compartment to displace the oxygen, then places his liquid sample into the compartment. If the nitrogen pressure (partial pressure) was 1.8 atm, what would be the concentration of dissolved nitrogen gas if the Henrys Law constant for nitrogen gas was 6.8 10-4 M atm-1 at this temperature? Pepper is trying to determine the density of her gold ring. The rings mass is 100 grams and the volume displaced by the ring is 5 milliliters. paglalahad ng natutunan tungkol sa sektor ng Paglilingkod.?please pasagot kailngan na sa thrusday What are the symptoms of someone possibly having a substance abuse problem? (Select all that apply) Question 7 options: Problems at school or work Sad all the time Physical health issues Neglected appearance Changes in behavior Money issues Swelling feet which country best represents the concept of nation-state in its internal cultural-political makeup and spatial organization? 9. Write the approximate location of Abidjan, Cte d'Ivoire, using latitudeand longitude. a cylindrical tube of air sustains standing waves at 600 hz, 800 hz, and 1000 hz, but at no other frequencies between 600 and 1000 hz. which of the following statements are plausible here? group of answer choices the fundamental frequency is 50 hz and the tube is open on both ends.