1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
2 years ago
12

Which of the following has the greatest impact on telecommunications design?

Computers and Technology
2 answers:
ddd [48]2 years ago
8 0

Answer:

consumer functionality demands

Explanation:

edg2021

In other words, the design is based on what the consumers want (their demands) and how well the design they choose works and fuctions

Design innovation has come a long way in a few years, and it shows no signs of slowing down. Tablets with detachable keyboards, smartphones with better cameras, and more versatile touch screen capability on everything all require technical design and engineering professionals. Along with the technical features, designers must create a device that’s sleek, appealing to consumers, and easy to use, but also rugged enough to survive being dropped, sat on, exposed to water, and dirty. Just as great car design is a successful mix of form and function, design is a major factor in a device’s popularity and sales.

Harrizon [31]2 years ago
6 0

Answer:

A

Explanation:

Hope Brainly understood

You might be interested in
Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
gayaneshka [121]

Answer:

A. Define boundaries

C. Deny access

D. Delay access

Explanation:

A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:

  1. Define areas of boundaries
  2. Delay or slow access. Example is the use of speed bumps to slow down vehicles.
  3. Provide access to entrances such as the use of gates
  4. Deny access to unauthorized personnel and allowing authorized personnel.
4 0
3 years ago
Which passage form the passage best contributes to elisa impatient tone
dusya [7]
You need to attach a document of where i would read it from
4 0
3 years ago
Consider a situation where we have a file shared between many people.  If one of the people tries editing the file, no other pe
Sergeu [11.5K]

Explanation:

I am a collection of this process from Trash on the computer system and the program that included a new twist on the computer and the skin that appears after loading and the Windows operating system it was much that appear on identifying long horizontal bar at the bottom of the screen and water pollution and its control car parts of the computer with enough letters and adware if for the collection of the fat calculation in the complete committee that in the water method is a product of a screensaver been disciplined displayed at the subject of the right click an icon To Number Sau new file getting opened on you can getting opened on a forgiving of an operational effectiveness of the program is a false false false

7 0
2 years ago
What are the 5 major components of computer.Give example of each​
notsponge [240]
1-Input unit
2-output unit
3-storage
4-central processing unit
5-arithmetic and logic unit
8 0
3 years ago
Rick is pursuing an undergraduate degree in electronics engineering. He aspires to be a robotics software engineer. Which topic
weeeeeb [17]

Options:

A.  database programming

B.  Embedded C

C.  testing software

D.  ABET

Answer:

<u>B.  Embedded C</u>

Explanation:

<em>Remember,</em> many robotic systems  make use of embedded systems, and one important programming language used is the C (Embedded C) Programming language.

Hence, since many hardware components can be programmed using C, it would therefore be necessary for Rick to be aware of Embedded C.

4 0
2 years ago
Other questions:
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cell in
    14·1 answer
  • Although the Earth's crust formed relatively early in the Earth's history, it was not present when the Earth first began to form
    12·2 answers
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cr
    7·1 answer
  • Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
    11·1 answer
  • Choose the answer that best completes the
    8·2 answers
  • BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this cou
    7·1 answer
  • How has the widespread shift to remote work caused businesses to reconsider their use of Extended Reality (XR)?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!