1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
13

which telecommunications service allows internet and telephone service to work over the same phone line

Computers and Technology
1 answer:
kifflom [539]3 years ago
6 0

Answer:

DSL telecommunications service allows internet and telephone service to work over the same phone line

Explanation:

DSL means Digital Subscriber Line

This provides “high speed internet connection” through “telephone line”. The beauty of it is that it does not require any “special wires” in additional. Only the “modem” will be additional part of expenses and a separate installation. But this would be provided by the “Service provider” itself.

In the classical method of using internet via phone will allow either a call to be made or internet to be browsed. Once a call comes in, the internet gets disconnected. But here it has overcome the disadvantage and now both phone calls and internet can be used simultaneously.

You might be interested in
Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
Snowcat [4.5K]

Answer:

k12

Explanation:

8 0
2 years ago
analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
LekaFEV [45]

Answer:

Explanation:

Multinational Companies tend to have millions of users from all over the globe who use their services and in doing so provide their information. This information gets saved on the databases of these companies. It is then up to the company on how they will use this information. This is where ethicality comes into play. A company can act ethically and protect the information that has been entrusted to them by their user, or they can act unethically and use the users' personal data to make profits. It has recently come to light that some companies have been using users' private data and would sell it to other companies for profit. These buying companies would then use the data for a variety of things such as ad targeting and statistics. These companies profited massively and the actual owners of the data did not, which makes this incredibly unethical.

8 0
3 years ago
So im new how exactly does this point system work???​
lapo4ka [179]

Answer:

Ok so basicly every time you see a question and you can answer it you press on the answer bar you type in your answers then you will automaticly get points depending on the question you answer, you need to get more than 5+ to ask a question  of your own

Explanation:

5 0
2 years ago
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
What can be defined as in information technology environment?
natka813 [3]
Here is your answer

7 0
3 years ago
Read 2 more answers
Other questions:
  • George borrowed some equipment from his friend for recording his monologue for his art class. He got all the equipment except th
    15·1 answer
  • Behaving in an acceptable manner in a workplace environment is referred to as workplace etiquette.
    12·2 answers
  • What is data. Explain it in brief
    11·2 answers
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • Which tab provide text formatting features
    11·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • _______ can be used to prevent busy waiting when implementing a semaphore.
    15·1 answer
  • Netflix shows to watch?
    11·2 answers
  • How many constructors are there in the following class declaration?class CashRegister { public: CashRegister(); CashRegister(int
    8·1 answer
  • Which statement is true?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!