1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
7

Morgan is the operations manager for a national appliance distributor. The company has offices throughout the United States. Com

munication between offices is vital to the efficient operation of the company. Phone sales are an important source of revenue. Managers and department heads across the nation strategize on a weekly, if not daily, basis. For the past three quarters, telephone charges have increased and sales have decreased. Morgan needs to cut expenses while keeping the lines of communication open. Analyze the telecommunications technologies you've studied in this unit—fax, broadcasting, VoIP, e-mail, blogs, and wikis—to determine which technology will best meet the needs of Morgan's company.
Computers and Technology
1 answer:
Alexxandr [17]3 years ago
3 0

Answer:

  • The following technology will best meet the needs of Morgan's company, which are as follows:
  1. The VoIP technology, this will make the audio communication between the different individuals inside the company or firm more easy then ever and it will be thus more convenient for the employees to connect with each other in a more convenient manner.
  2. The e-mails are also there to provide more support and add value to the over all communication system of the company.

You might be interested in
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
3 years ago
Read 2 more answers
The Class of computers used in <br>scientific applications are called​
sashaice [31]

Answer:

sala de informática

Explanation:

salas de informática são utilizadas cada vez mais no mundo pelo aumento excedente de uso da tecnologia os estudantes precisam aprender conceitos básicos de informática e eletrônica

5 0
3 years ago
Screenshot is the image of your active MS Word PowerPoint window<br>Is it true or false? ​
crimeas [40]

true

Screenshots are basically snapshots of your computer screen. You can take a screenshot of almost any program, website, or open window. PowerPoint makes it easy to insert a screenshot of an entire window or a screen clipping of part of a window in your presentation.

3 0
3 years ago
For the bag class in Chapter 3 (using a fixed array and a typedef statement) what steps were necessary for changing from a bag o
stiks02 [169]

Answer:

B. Change the int to double in the typedef statement and recompile

Explanation:

A typedef declaration is used to assign names to database.

Syntax:

typedef data_type new_name;

For this case the initial deceleration was

typedef int bag;

To change it to double values we have to do following

typedef double bag;

Therefore, option B is correct change the int to double in the typedef statement and recompile.

8 0
3 years ago
100 POINTS + BRAINLYEST TO FIRST PERSON THAT IS CORRECT!!! Which items can be found in the Properties section of the Backstage V
Lunna [17]

Print settings

author off document

how many times it has been viewed

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which stream of digital arts are content manager, content developer, flash developer, and information architect a part of?
    14·1 answer
  • How you think the new values of your generation will affect economic decisions?
    11·1 answer
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • In a(n) ____ design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back
    9·1 answer
  • Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which
    11·1 answer
  • Which of the following defines what privacy policy is?
    6·2 answers
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.
    14·1 answer
  • Please help me i will mark as brainliest​
    10·1 answer
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!