1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
4 years ago
12

Which of these pieces of hardware is used for telecommunication

Computers and Technology
2 answers:
TiliK225 [7]4 years ago
8 0

Answer:

*inhales in nervousness* im...not ready but ill guess. it's the telephone?

Explanation:

i think its usually because telephones are a way to telecommunicate and its hardware (its a guess so... i might be wrong)

Minchanka [31]4 years ago
6 0

Answer:

DSL

Explanation:

APEC CERTIFIED

You might be interested in
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Amo
ANTONII [103]

Answer:

<h2> Controlled maintenance and  configuration change control.</h2>

Explanation:

Among the types of LAN control standards are <em><u>controlled maintenance,  </u></em>which creates the schedules on LAN- attached devices for scheduled preventtative and consisten maintenance, and  <em><u>configuration change control.</u></em>

4 0
4 years ago
The _____ feature enables you to represent text as colorful visuals.
Radda [10]

Answer:

complex formatting feature enables you to represent text as colorful

visuals.

mark as brainliest

4 0
2 years ago
What is radio frequency identification used for
Sauron [17]

Answer:

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter.

Radio Frequency Identification (RFID) is a technology designed to allow objects, animals and even human beings to be identified, located, and tracked using radio frequency signals.

8 0
3 years ago
Why entity relationship model is used for data manipulation??<br><br>​
MrMuchimi

Answer:

An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)

<em>Hope u got it </em>

<em>If you have any question just ask me</em>

<em>If you think this is the best answer please mark me as brainliest</em>

<em></em>

8 0
3 years ago
Other questions:
  • Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A
    8·1 answer
  • so im thinking about building my own pc for a decent price can anyone point me to a website where i can buy the parts and name t
    13·2 answers
  • Which is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
    7·1 answer
  • Someone please help me? Thanks!
    10·2 answers
  • LILLE VIC LUNCUL ANCI.
    5·1 answer
  • Ryan is working on the layout of his web page. He needs to figure out where the title, links, text, and images should go. Which
    13·2 answers
  • A company's desire to sell products and services: A. will ultimately lead to its doom. B. explains why the web took off C. can d
    9·2 answers
  • In what ways can you modify the location of the neutral point?
    12·1 answer
  • You add a filter by condition, and set the condition to [weight]&gt;50. how will this affect your data?
    5·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!