1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
11

Dylan, an interior designer, has sketched out a layout for a client's living room. He wants the client's approval of the layout

before he begins shopping for furniture. The telecommunications technology Dylan is most likely to use to send his sketch to the client is _____.
a. fax
b. HDTV
c. PDA
d. VoIP
Computers and Technology
2 answers:
liraira [26]3 years ago
4 0
It's either A, or C but most likely C, PDA
jok3333 [9.3K]3 years ago
3 0

Answer:

a. fax

Explanation:

-Fax is a machine that scans a document and sends it to a telephone number that is associated with an output device.

-HDTV is a tv system that provides a higher resolution than traditional TVs.

-PDA is a device that can work as a cellphone, fax and has internet features.

-VoIP is a technology that allows you to make calls over the internet.

According to this, the telecommunications technology Dylan is most likely to use to send his sketch to the client is fax.

You might be interested in
My ar goal is 16.3 what percent am i at if i have 3 points??
Mazyrski [523]

24 percent so far so keep working at that goal

5 0
3 years ago
What are the preset formulas in a spreadsheet called?
Oksanka [162]
They are called functions on a spreadsheet.
5 0
4 years ago
Read 2 more answers
Who else hates it when Edgenuity has technical problems with international students?
konstantin123 [22]

Answer: ya it sucks

AI used to be a A student until edgenuity had to be used.

Explanation:

7 0
3 years ago
In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the r
Zielflug [23.3K]

Answer: 10 students

Explanation:

Students younger than 10 = 50%

Students that are 10years old = 1/20 = 1/20 × 100 = 5%

Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%

Students that are 12 years or older

= 100% - (50% + 5% + 10%)

= 100% - 65%

= 35%

This means that 35% of the students are 12 years or older and we've been given the number as 70.

Let's say the total number of students is x. Therefore,

35% of x = 70

0.35 × x = 70

0.35x = 70

x = 70/0.35

x = 200

The total number of students is 200.

Therefore, the number of students that are 10years will be:

= 1/20 × 200

= 10 students

Therefore, 10 students are 10 years.

3 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Try using the inv command to find the inverse of the matrix Notice the strange output. Include your command and the output in yo
    10·1 answer
  • If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
    7·1 answer
  • 2. Which of the following best describes the protocols used on the Internet?
    15·1 answer
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • Help me please and thanks
    8·1 answer
  • A software process describes the interrelationship among the phases by expressing their order and frequency, but does not define
    14·1 answer
  • Why are formulas used in spreadsheets?
    10·1 answer
  • Write the technical terms for the following statements: The repeated working capacity of computer.
    15·1 answer
  • What is the difference between margin and padding property?
    7·1 answer
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!