1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
8

A corporate office has a huge number of employees. Every employee has a telephone next to their computer so that they can call o

ther employees in the same office regarding official work. The caller has to dial a particular extension number so that the intended receiver gets the call. Which telephone network is used in this office?
Computers and Technology
1 answer:
Lemur [1.5K]3 years ago
5 0

Answer:

PBX system.

Explanation:

PBX is an acronym for private branch exchange. It is a private telephone network service that allows users to communicate by making or taking inbound and outbound calls using a gateway, voice mail, transfer calls, call queues and recording.

In an office, employees having a PBX telephone can call other employees in the same office regarding official work.

The callers have to dial a particular extension number so that the intended receiver gets the call.

Example of an extension number is 111-5001 and 111-5002, with a central number as 111-5000.

Hence, the telephone network used in this office is the PBX system.

You might be interested in
How do I mark someone brainiest
svet-max [94.6K]

Answer:

when someone answers your questio correctly, you will see a red crown. Click on that and mark them the most brainiest

Explanation:

3 0
2 years ago
Read 2 more answers
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into obj
Alekssandra [29.7K]

Answer:

True

Explanation:

5 0
2 years ago
The feature that sets Macs apart from other operating systems is the _____.
pochemuha
What truly sets macs apart is the desktop as they don't have a separate tower system like most other systems do
8 0
3 years ago
Read 2 more answers
3. How are you able to create photographs differently than 100 years ago?
Agata [3.3K]

Answer:

it willbe black and white

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    11·1 answer
  • Microsoft words spell checker
    8·1 answer
  • Create a button to play the playlist <br><br> Java, netbeans
    7·2 answers
  • When you’re in the Normal view, what are the visible panes?
    15·2 answers
  • Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
    11·2 answers
  • Speech about society being normal
    12·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • Did brainly.com go down today? i coudlnt get in it
    15·2 answers
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
  • Drag the words into the correct boxes
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!