1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
15

Write a definition in your own words for telecommunication. Do not cop and paste please.

Computers and Technology
1 answer:
34kurt3 years ago
7 0

Answer:

Telecommunication is also known as telecom(s), is the exchange of information over significant distances by electronic means, referring to all types of voice, data, and video transmission. This is a broad term that includes a spacious telecommunication field called the electromagnetic wireless range of technologies and communications infrastructures, such as wired phones; mobile devices, such as cellphones; microwave communications; fiber optics; satellites; radio and television broadcasting; the internet; and telegraphs.

A complete, single telecommunications circuit consists of two stations, each equipped with a transmitter and a receiver. The transmitter and receiver at any station may be combined into a single device called a transceiver. The medium of signal transmission can be via electrical wire or cable -- also known as copper -- optical fiber, electromagnetic fields, or light. The free space transmission and reception of data by means of communications. information  

Explanation:

You might be interested in
Add the following methods to the ArrayCollection class, and create a test driver for each to show that they work correctly. In o
maks197457 [2]

Answer:

Attached are screenshots of the working code - baring in mind this only works on mutable Collection types. (ones that can be changed) if you use Collections that don't support this you may experience an Unsupported Operation Exception - but this is expected.

Explanation:

Using Java streams as an alternative for some answers.

3 0
3 years ago
What is the cheapest type of printer to buy and run?
myrzilka [38]
It depends solely on how much you will use it. For example, laser printers are more suitable for offices, schools, and environments, where the printer is used almost constantly. If it's used a lot, you're probably looking at a laser printer, since the cartridges have a slightly higher price, but a much higher yield. If you can't afford a laser printer, and you're only going to use it at home, you're probably looking at an inkjet. If you need to print off something for school, ask your teacher, or someone that works at your school. Some secondary/high schools might allow you to use their printers at a lower price
7 0
3 years ago
Read 2 more answers
Tips to identify email scams.
malfutka [58]

Answer:

Explanation:

dont open or sign up to anything that seems to good to be true

7 0
3 years ago
Advantages of a compiler​
valentina_108 [34]

Answer:

Improved performance.

Reduced system load.

Protection for source code and programs.

Improved productivity and quality.

Portability of compiled programs.

SAA compliance checking.

3 0
2 years ago
Read 2 more answers
____ hack systems to conduct terrorist activities through network or Internet pathways
Advocard [28]

Answer:

Cyberterrorists

Explanation:

Cyberterrorists -

These are the people who illegally , without any authentication , are able access some other person's personal system or internet server , are referred to as cyber terrorists.  

Internet service is used in this process , which can lead to loss of life , harm , threat or some illegal practice.  

Hence, from the statement of the question,  

The correct term is cyberterrorists.

6 0
3 years ago
Other questions:
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • Briefly describe the client/server model.
    8·1 answer
  • Which network media uses different regions of the electromagnetic spectrum to transmit signals through air?
    13·1 answer
  • ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
    14·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • ANSWER ASAP, I'LL MARK THE BRAINLIEST
    7·1 answer
  • What is the difference between a surge and a spike?
    5·1 answer
  • 1. What is hydrolics?​
    6·1 answer
  • You are building a computer from spare parts in the office. You build the computer and realize you have several different types
    5·1 answer
  • Name four successful conversions to an electronic health record system in a medical facility
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!