1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
12

ICT Practical Work

Computers and Technology
1 answer:
Shalnov [3]3 years ago
3 0

Explanation:

ICT Practical Work

3rd Stage

In this next process, carry out an analysis of where the information travels. For which we must have read and understood the functions of the nodes.

An English executive wishes to send a letter to an Argentine colleague to organize a commercial operation.

Write a draft in English.

The secretary translates it into Spanish.

Envelopes it properly to send the letter by air.

Label it.

He takes it to the mail where it is bagged, after sorting, with other envelopes, for different destinations, in the city of Bs. As. According to the transport possibilities, they decide if it will be sent on a direct flight, or with a stopover in Rió De Janeiro.

The post office of Bs. As. Verifies the state of the envelope, because if it is damaged; You can return it to the sender or (if the destination is legible) deliver it with a warning note regarding the condition of the envelope.

The Argentine executive receives the letter and, despite agreeing with the conditions of the transaction, detects a spelling error, corrects it, and responds to his colleague.

At what point in this process, would you locate each of the following node functions? : Interface, transmission, error detection, format conversion,

You might be interested in
Which network is the predecessor of the Internet?
disa [49]
The predecessor of the internet is ARPANET better known as Advanced Research Project Agency
4 0
3 years ago
10 sentences about computer parts.
Ahat [919]
One computer part is the CPU, it’s a piece of hardware the last allows your computer to access and interact all the applications and programs. The first ever CPU chip was invented around 4 decades ago. The keyboard is another computer part and it allows the user to type letters and numbers. There are about 104 keys on a keyboard and there are different parts in it. Some of the parts include, control keys, function keys, navigation keys, numeric keypad, and so on. A mouse is another device used with the keyboard to position the cursor. It’s a hand held device that detects two-dimensional motion relative to a surface. This motion is typically translated Into the motion of a pointer on a display, which allows a smooth control of the graphical user. Memory is a device to store all of your information and saved data. The motherboard is the backbone that tied together the computers components at one spot.
6 0
2 years ago
1. The process of creating workable systems in a very short period of time is called
12345 [234]

Answer:

okay i know only 1st question and answer

answer:rapid application development

6 0
3 years ago
This is not a factor that you should use to determine the content of your presentation. Your audience your goals your purpose yo
aksik [14]

Your technology I believe

4 0
3 years ago
Read 2 more answers
Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete ov
miss Akunina [59]

Answer:

See explanation below.

Explanation:

Note: This question is not complete. The complete question is therefore provided before answering the question follows:

Suppose you are among those who believe that the NLRA should be transformed. What arguments support the claim that a complete overhaul is necessary? What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

The explanation of the answers is now provided as follows:

a. What arguments support the claim that a complete overhaul is necessary?

The adversarial nature of labor relations in the United States, which many claim is produced by the National Labor Relations Act's (NLRA)'s very existence, is the fundamental reason for its transformation. In a global economy, supporters of transformation say that adversarialism is undesirable for employees and employers because it makes representation and profit maximization more difficult. The principles of exclusive representation and majority support are specific aspects of the NLRA that promote adversarialism.

The fact that it is compulsory for a union to win the support of a majority of workers, the process of representation results into a tone of a "u versus. them". As a result, both sides try to make the other look bad in the eyes of the employees who will vote.

Based on the above, a  complete overhaul is necessary.

b. What alternative models might be considered as a replacement for the NLRA model of exclusive representation?

Giving nonmajority unions legal protection by requiring employers to negotiate with them is one alternative to replace the NLRA model of exclusive representation. Under this, the contracts would not cover all employees; only those who are union members would be covered.

Another alternative is that work councils could also be used to supplement or replace the certification process. Employee free speech rights, wrongful dismissal procedures, employee participation on business boards of directors, and the right to workplace information are all potential transformation factors that might be taken into consideration.

3 0
2 years ago
Other questions:
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-le
    12·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
    15·1 answer
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • Please help I will mark brainliest ⚡️⚡️⚡️⚡️
    12·1 answer
  • Which of the following is the most significant result of technological innovation?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!