1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
11

How is communication different from data transfer?

Computers and Technology
1 answer:
Lelechka [254]3 years ago
8 0

Answer:

B) Communication includes e-mails and voice calls; data transfer includes downloading files and streaming.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

The linear model of communication comprises of four (4) main components and these are; sender, message, channel and receiver (recipient).

Data transfer can be defined as the transmission of analogue or electronic data such as pictures, music, videos, texts, etc., from one computer node to another computer system through the use of various techniques and technologies.

Communication differs from data transfer in the sense that communication involves the use of channels such as e-mails and voice calls while data transfer includes downloading files and streaming over a Transmission Control Protocol and Internet Protocol (TCP/IP) network, through the use of a file transfer protocol (FTP) on port number 20 or 21.

You might be interested in
A seller buys and item from a manufacturer for 9,500
andriy [413]

we need more info

so we can answer the question

8 0
4 years ago
Which of the following actions would help people determine their interests?
lorasvet [3.4K]
That depends on what the actions are, and what their personality is like.
8 0
3 years ago
_____ is a scam in which access to one's own computer is locked or restricted in some way.
gtnhenbr [62]
Ransomware is the answer to this.
5 0
3 years ago
What is required to view other users’ calendars in Schedule view? Check all that apply.
Alexus [3.1K]

Answer: A, B, D, E, F

Explanation:

6 0
3 years ago
Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match
Lapatulllka [165]

The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data

Further Explanation:

The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.

Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.

  • To achieve this, select a cell in your Excel worksheet
  • Type =VLOOKUP in the type bar of the Excel sheet
  • Select the value to look up and then select the data range
  • Type the column number that you want to search and then type FALSE
  • Press enter

Learn about VLOOKUP in Excel by clicking the links below

brainly.com/question/9579933

brainly.com/question/10686097

#LearnWithBrainly

4 0
4 years ago
Other questions:
  • How can ASCII be used to represent characters in a computer system?
    15·1 answer
  • Which of the following is the part of a digital camera that acts as the film?
    11·1 answer
  • How are procedural and object-oriented programming approaches similar?
    9·1 answer
  • Juan copied and pasted information from a Word document
    8·1 answer
  • __________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
    6·1 answer
  • Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.
    9·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • What is string literal in Java?
    5·1 answer
  • Mention three types of pipeline hazards​
    6·2 answers
  • How do i stop my computer from automatically connecting to a wireless network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!