1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
13

Sending or receiving information between twomore person.technical term​

Computers and Technology
1 answer:
Anuta_ua [19.1K]3 years ago
4 0

Two-Way Communication

You might be interested in
When considering changing the content of a cell which button should you press to leave the cell as it originally was?
densk [106]
Esc key or cancel .........
7 0
3 years ago
Read 2 more answers
When you configure a new linked mailbox user, you must specify a _______________ to identify the remote user account that has th
vazorg [7]
<span> You must specify a master account.</span>
7 0
3 years ago
___ is the amount of data that a storage device can move from the storage medium to the computer per second.
Sindrei [870]

Answer:

The answer is "data transfer rate".

Explanation:

The rate of information transfer is the sum of digital information, that travels from one destination to another at a particular time. This can also be viewed as transportation frequency from one place to another one of a given quantity of information. It is the processing power of the larger and specified map, which significantly lowers the data transfer rate.

6 0
4 years ago
The content an craigalist is mainly monitered by?
Jlenok [28]
D)no one

..........................................
8 0
3 years ago
When creating a document template, you can either start from an existing document or begin from _____.
Anna35 [415]
A new blank document
7 0
3 years ago
Other questions:
  • Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
    11·2 answers
  • Two fingers are assigned to six letters each. What fingers are they?
    9·1 answer
  • You are troubleshooting an interface issue on your cisco ios isr. the output of "show ip interface brief" indicates that etherne
    11·1 answer
  • What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
    7·1 answer
  • Jennifer has written a business report. What should be her last step before she submits the story for publication?
    10·2 answers
  • Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
    9·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!