1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
4 years ago
12

Which telecommunication device uses satellites?

Computers and Technology
2 answers:
umka21 [38]4 years ago
5 0

Answer:

A satphone

Explanation:

This is the correct answer. I just took the Edmentum Plato Mastery Test.

Simora [160]4 years ago
3 0

its actually a sat phone, i just did it so ik, but it also a way older phone that has an antenna

You might be interested in
HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
Novosadov [1.4K]

Answer: evolutionary with high fidelity

Explanation:

You are trying to improve the model so that it is able to match any problem. This is evolutionary.

At the same time the model seems to be close to being finalised with all the improvements being made. It is past the design stage and so must be a high fidelity prototype.

6 0
3 years ago
NEED HELP(10 POINTS) PLEASE HELP MATH
DiKsa [7]
78 ft. hope it helped
6 0
3 years ago
Read 2 more answers
How do you double space on microsoft word?
Kryger [21]
In Home Tab, Paragraph section, you will an icon called "Line and Paragraph Spacing", click that and then you can choose 2.0 for double space

4 0
4 years ago
A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
raketka [301]

Answer:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

Explanation:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

4 0
2 years ago
Consider the following code segment:
horrorfan [7]

Answer:

13333333333333333333333fv mvfdmv mfv fmv f mf vmf f vfmvnfmvnmnvmfnvmnvmnv3Explanation:

6 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • What is the relationship between IaaS and TCP/IP and network services?
    10·2 answers
  • 6.Which of the following statements illustrates a characteristic of a person's attitudes
    14·2 answers
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • Which of the following would most likely be the target audience for a product
    7·2 answers
  • What is Mobile Edge Computing? Explain in tagalog.​
    5·2 answers
  • Why can a bank afford to pay an interest rate on a savings account?
    11·1 answer
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • Please help! first one to answer correctly gets brainliest and thanked
    7·1 answer
  • Objective a right turn true or false?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!