1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
3 years ago
15

In 3–5 sentences, explain how telecommunications technology helps workers do their jobs more efficiently.

Computers and Technology
1 answer:
Anvisha [2.4K]3 years ago
4 0
Technology helps business professionals, keep more organized, communicate better, and efficiently keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's. With better alarm systems, camera's and online banking, security measures are endless. 

Hope this helped :)  <span />
You might be interested in
(Type the correct answer in the box.)
mihalych1998 [28]

1. If in MS Access, Click on Query design, select the required Table.

 In Field select required field, in this case Select [Name of Plants]. Click on Order and set it as Ascending / Descending.

2. If you want to write a Query that it will look like this

SELECT MedicinalPlants.Name of the plantsFROM MedicinalPlantsORDER BY MedicinalPlants.Name of the Plants;

Read more on Brainly.com - brainly.com/question/3433328#readmore

4 0
3 years ago
Read 2 more answers
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Hãy giúp tôi giảiiii​
Kazeer [188]

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

8 0
2 years ago
An___ is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
Nataly_w [17]
A window is a rectangular work area in the desk top that contains a program, text, files, it other data and tools.
Hope this helps!
5 0
3 years ago
A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate
madam [21]

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

6 0
3 years ago
Other questions:
  • Device that converts sound into electrical signals, which are sent to the computer or other recording device
    6·1 answer
  • I have a question about a hotel tv:
    10·1 answer
  • What weight pencil is recommended for darkening lines and for lettering? *
    7·2 answers
  • Which type of ICS facility is used to temporarily position and account for personnel, supplies, and equipment awaiting assignmen
    15·1 answer
  • g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo
    6·1 answer
  • scientist think that two species with homologous structures probably had ____ A. Ancestor B. Fossil C. Environment D. Offspring
    7·1 answer
  • Which of the following is not a command for determining if MySQL is running on Linux (Ubuntu)?
    7·1 answer
  • Management information system by different outhors<br>​
    10·1 answer
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
  • What are the characteristics of computer. Explain any one​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!