1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
15

​___________ are taking over as the primary communication platform for many business professionals. A. desktop computers B. lapt

op computers C. email D. mobile devices E. websites
Computers and Technology
2 answers:
Komok [63]3 years ago
8 0

Answer:

Mobile devices .

Explanation:

For several industry professionals, mobile phones take over as the main communication channel because mobile devices are portable and easy for the purpose of communication or handle. With the help of mobile devices, they can easily interact with their employees, seniors, clients and other persons from which they want to interact or communicate.

  • Option A is not true about the scenario because it is not portable and it is not easy to handle as compared to the mobile devices. So, it's not the primary mode of communication.
  • Option B is not true about the scenario because it is portable but as compare to the mobile device, mobiles are more flexible, portable for primary communication.
  • Option c is not completely true because the professionals give primary preference to the calls than emails.
STALIN [3.7K]3 years ago
4 0

Answer:

Email

Explanation:

E-mails (electronic mails) is an online communication platform in which a message can reach several millions of people as long as you have their email address. Businesses can also run paid adverts on emails so as to reach potential prospects, example of email platforms are; Google mail, Yahoo Mail, Microsoft outlook e.t.c

You might be interested in
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
3 years ago
Jason works as a Help Desk Technician for uCertify Inc. The company has a Microsoft Windows XP-based network. Jason wants to vie
WINSTONCH [101]

Answer:

ipconfig

Explanation:

ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;

i. the IP address of the computer

ii. default gateway address

iii. subnet mask

iv. Media Access Control (MAC) address.

6 0
3 years ago
.Write a C++ program that displays your name and address (if you value your privacy, a fictitious name and address).
olga_2 [115]

Answer:

#include <iostream>

using namespace std;

int main() {

   cout<<"My name is Rajat Sharma"<<endl<<"My address is Flat no=23 GH=5 Paschim Vihar New Delhi 110087 India"<<endl;

return 0;

}

Explanation:

The program is written in C++ language.In the program I have used cout to print my name and the address.First the name will be printed then the address in the new line endl is used for new line.To print any sentence just put them in double quotes.The same sentence in the program will be printed on the screen.

5 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
3 years ago
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
Other questions:
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • Categories of general purpose application software and examples each​
    13·1 answer
  • Linux would be a good example of?
    6·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • In which step of writing a program does a programmer first use a<br> compiler?<br> documentin
    6·1 answer
  • To execute a prepared SQL statement, you can use the ________________ and execute() methods of the PDOStatement object to set pa
    10·1 answer
  • A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD inclu
    7·1 answer
  • What are the significances of blogs?
    7·2 answers
  • 30 POINTS FOR THE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!