1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
6

List ICT components of video conferencing​

Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
5 0

Answer:

Displays

Microphones

Speakers

Internet Connection

Explanation:

You might be interested in
Pleaseee help me with the typical situations of the icons(i already know for words but I have no idea for giving the situations
Aliun [14]
Send the icons so i can answer
4 0
2 years ago
Read the scenario, A manager wants to hire a new technician for the help desk that typically assists clients with simple compute
Yuliya22 [10]
The correct option is D.
The main reason for hiring the technician is to get someone who will be helping the clients to solve their computer problems. Since most of the clients  will probably know little about computer, the manager will need to hire someone who is ready to serve the clients [service oriented], someone who is a problem solver and someone who is great at communicating with different types of people.
8 0
3 years ago
The collection of programs on a computer is referred to as _______________.​
schepotkina [342]
It is referred to as software

Software consists of an entire set of programs and routines linked with the operation of a computer. In other words, it is a collection of executable instructions that enable you to interact with a computer and its hardware. A computer would be rendered useless without software.

 






5 0
4 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
It is very easy to change data into charts<br> what is a Microsoft Excel Microsoft Outlook or both​
Vadim26 [7]
It’s microsoft Excel
8 0
3 years ago
Other questions:
  • 17. Which of the following is not a visible section in a File Explorer window?
    8·1 answer
  • A user has requested to have an extra 4GB of memory installed on a laptop. During the Installation process, which of the followi
    6·1 answer
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    8·2 answers
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • The length property of the String object returns
    15·1 answer
  • When trying to work efficiently, how should you prioritize your tasks? (Site 1)
    8·1 answer
  • Team ordering You have the results of a completed round-robin tournament in which n teams played each other once. Each game ende
    15·1 answer
  • Can anyone please help?
    13·1 answer
  • Can anyone provide a good java program that shows how to implement a button?
    11·2 answers
  • What is an example of new technology having a negative impact on sustainability?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!