1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
6

"Managers and department heads across the nation strategize on a weekly, if not daily, basis. For the past three quarters, telep

hone charges have increased and sales have decreased. Morgan needs to cut expenses while keeping the lines of communication open.
Analyze the telecommunications technologies you've studied in this unit—fax, broadcasting, VoIP, e-mail, blogs, and wikis—to determine which technology will best meet the needs of Morgan's company."


My question is what is VoIP and would it be better than the other options?
Computers and Technology
1 answer:
Marizza181 [45]3 years ago
7 0

Answer:

you could benefit from it as well by possibly being corrected.

Explanation:

You might be interested in
Which is a safe Internet behavior?
Westkost [7]
Don’t give out personal information
7 0
3 years ago
What is a programming method that provides for interactive modules to a website?
Veseljchak [2.6K]

Answer:

Java?

Explanation:

8 0
3 years ago
I have a singular monitor that is a TV for my computer. Recently, I took apart my computer and put it back together. When I put
makkiz [27]

your tv should have either a controls are or a setting area there is an option for "game mode" that should work with the HDMI.

4 0
2 years ago
Which tab is used to configure an export to PST in Outlook 2016?
Blizzard [7]

Answer:

file

Explanation:

you should go through the file so as to configure it

3 0
3 years ago
Read 2 more answers
What are some of the challenges that could arise from setting up a file management system on a computer?
Arisa [49]
It could fail, it would take a long time setting it up and aslo it could be easily hacked.
3 0
2 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Codio Challenge Activity PythonWe are passing in a list of numbers. You need to create 2 new lists in your chart, then put all o
    13·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • To use a stored address, C provides us with an indirection operator, ____.
    6·1 answer
  • Nvm, Its B.
    10·1 answer
  • A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
    14·1 answer
  • Describe the positive and negative effects of Internet​
    6·2 answers
  • What is the full from of CPU?​
    5·2 answers
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • Repeated execution of a set of programming statements is called repetitive execution.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!