1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
12

How telecommunications works?​

Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
3 0

Answer:

Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks.

Explanation:

You might be interested in
What does it mean when information found from web research is valid?
Mrac [35]

Answer:

The information comes from an official source.

5 0
3 years ago
When you record a macro, all of the actions are converted by the program to code
Yuri [45]

Yes you are creating a list of actions based off the previous

5 0
3 years ago
Read 2 more answers
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
(viii) Word does not allow you to customize margins. <br>true/false:-​
Tatiana [17]
In Word, each page automatically has a one-inch margin. You can customize or choose predefined margin settings, set margins for facing pages, allow extra margin space to allow for document binding, and change how margins are measured.

I would say false
6 0
3 years ago
Which type of operating system is usually used in personal computers?
joja [24]

Answer:

Microsoft Windows

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • 642<br> +277<br> What does 642+277
    7·1 answer
  • Network id is 192.168.10.32/28. what would be the ip address, if you assign the last available ip address in the range
    14·2 answers
  • PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
    7·1 answer
  • Which of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case
    12·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    14·1 answer
  • A(n) ___________________________________ is a legal contract between a vendor and a user that governs the use of a software pack
    11·1 answer
  • Which utility is used to transform a standalone Windows Server 2012 R2 system into an Active Directory domain controller?
    6·1 answer
  • The lenght of a formula Can't be more than ________ characters​
    11·2 answers
  • A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update
    10·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!