1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
2 years ago
5

Areas on which the development of the computer as a communication technology is based

Computers and Technology
1 answer:
Alchen [17]2 years ago
4 0

Answer:

Artificial Intelligence.

Automated personal digital assistant.

THz frequencies for Communications (5G & 6G)

Blockchain.

Virtual reality and augmented reality.

Internet of Things (IoT)

Visible light communication.

LTE.

Explanation:

You might be interested in
The fraction 460/7 is closest to which of the following whole numbers?
Bess [88]
I don’t see any of “the following numbers”
3 0
2 years ago
What do you think of my profile picture
Gnom [1K]

ayo it's pretty sweet lma.o.

8 0
2 years ago
Read 2 more answers
What is the central idea of the second section:
Ivanshal [37]

Answer:

The second is that laughter prepares us for tough conditions. And it does always ensure good things for us, and there are many real advantages of the laughter that we can trace out. And all those can be parsed from our real life. We just need to think of a sad situation and try to realize how laughter helps us get rid of that sad situation. And that is what is the central idea of the second section.

Explanation:

Please check the answer section.

7 0
2 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
The most direct way for jonathon to gain on-the-job experience and earn money while attending school is to apply for:
astraxan [27]
The most direct way for jonathon to gain on-the-job experience and earn money while attending school is to apply for: D:a work-study program
5 0
2 years ago
Read 2 more answers
Other questions:
  • When using vlookup, the _____argument is optional?
    8·1 answer
  • If I want to have an estimate of the number of people who visited my website, which metric should I use?
    5·2 answers
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • Whats your favorite sport between these options?
    12·2 answers
  • All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ab
    13·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • Why does Brainly keep on giving me ads. All I want to do is get answers not be smothered by a bunch of ads. And then when you go
    7·1 answer
  • The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth
    5·1 answer
  • GIVING BRAINLIEST
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!