1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
12

____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile

(GSM) Communications c. ​Time Division Multiple Access (TDMA) d. ​Personal Communications Services (PCS)
Computers and Technology
2 answers:
Over [174]3 years ago
5 0

Answer:

Global system for mobile

Explanation:

Inessa05 [86]3 years ago
3 0

Answer:

The answer is "Option b"

Explanation:

GSM is a cellular network system of the second generation, which is currently used in the world's. It is most useful in a telecommunications network. It is also regarded as open-ended and wireless cellular technology for mobile voice and data transmission, and certain choices were incorrect, which is explained as follows:  

  • In option a, It is wrong because it is part of the first generation.
  • In option c, It works on channels, that's why it is wrong.
  • In option d, It is part of wireless communication, that's why it is wrong.
You might be interested in
Using a WHILE loop write a program that asks the user to guess your favorite number. The program should end when the user guesse
eduard

Answer:

fav_number=26

guess=0

while 0==0:

   try:

       guess=int(input('Enter your guess: '))

   except:

       print ('You have entered an invalid value.')

   else:

       if guess == fav_number:

           break

       elif guess>fav_number:

            print ('Try a smaller number.')

       elif guess<fav_number:

           print ('Try a larger number')

Explanation:

define a variable fav_number and set it to number. write an infinite while loop to read input from user. In try block get input from user, if user enters invalid input code in except block will be executed. For valid input

  1. check if its greater than favorite number, if yes print try smaller number.
  2. check if its smaller than favorite number, if yes print try larger number.
  3. check if its equal to favorite number, break loop and exit

4 0
4 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Use sample program from called getopt.c (provided below)
GREYUIT [131]
Beasts shush shrub Nehru need Brid Nehru
6 0
4 years ago
Can someone just help Im really struggling right now<br> Tysm if you help
frutty [35]

That's really really hard, my god Cassie!

Explanation:

I don't know what the answer is. bekos Yu du not is da layer of da peyk Cassie. di ka mukhang dragon

6 0
3 years ago
Who has a relationship like this quote?
lora16 [44]

Answer:

me

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
    10·1 answer
  • Write the code to declare a variable to hold the value of the grade you hope to get in this class. What stdio.h input function w
    13·1 answer
  • The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
    7·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • How is Office 365 different from Windows Live Office?
    12·1 answer
  • A system administrator suspects that there is an error in the replication configuration. How can the system administrator look f
    7·1 answer
  • )duplicate hash code
    15·1 answer
  • Which one of the following items is an example of software?
    5·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!