1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
12

In which of the following situations might someone use a combination of WiFi and cellular technology?

Computers and Technology
1 answer:
Tju [1.3M]3 years ago
6 0

Answer:

(A) A group of friends takes a selfie with a cell phone and uses the phone to upload the picture to a social media site.

Explanation:

The situation in which a person might use a combination of WiFi and cellular technology is option A.

First of all, what is cellular technology, what is WiFi?

Cellular technology is simply using a mobile phone while WiFi which means wireless fidelity is a network that allows users to get access to the Internet via Wide Area Network.

Therefore, a group of friends that take a selfie with a cell phone and uses the phone to upload the picture to a social media site is an example of using cellular network and WiFi

You might be interested in
List down any 5 Advantages and any 5 Disadvantages of Computers
Dahasolnce [82]

Advantages

Increase your productivity. ...

Connects you to the Internet. ...

Can store vast amounts of information and reduce waste. ...

Helps sort, organize, and search through information. ...

Get a better understanding of data. ...

Keeps you connected. ...

Help you learn and keep you informed. ...

Can make you money.

Disadvantages

Too much sitting. ...

Carpal tunnel and eye strain. ...

Short attention span and too much multitasking. ...

Potential of loss of privacy. ...

Can limit learning and create a dependency. ...

Time sink and lots of distractions....

5 0
3 years ago
Read 2 more answers
30points for help
stealth61 [152]

Answer:

blank 4

Explanation:

I just did this assignment got 100

4 0
3 years ago
When you enforce restrictions, what must you do immediately?
sweet [91]
The answer is A create a password
4 0
3 years ago
Read 2 more answers
7.4 code practice question 1 edhesive
Semmy [17]

Answer:

7.4 Code Practice: Question 1

def GPAcalc(g):

if g == "a" or g == "A":

return 4

elif g == "B" or g == "b":

return 3

elif g == "C" or g == "c":

return 2

elif g == "D" or g == "d":

return 1

elif g == "F" or g == "f":

return 0

Explanation:

4 0
3 years ago
Read 2 more answers
__________________________would be involved in projects such as implementing security measures and software to protect systems a
defon

<u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

<h3>What does an administrator of a network do?</h3>

The  network administrator is known to be a person who is involved in the day-to-day management of these networks is the responsibility of network and computer system administrators.

They function by helping to plan, set up, and provide maintenance for a company's computer systems, etc., for data communication.

Therefore, <u>Network Administrator</u><u>/Network Engineer</u> would be involved in projects such as implementing security measures and software to protect systems and information infrastructure, including firewalls and data-encryption programs.

Hence, option D is correct.

Learn more about Network Administrator from

brainly.com/question/5860806
#SPJ1

3 0
1 year ago
Other questions:
  • List and the deference between MS access objects​
    8·1 answer
  • PLEASE HELP!
    12·2 answers
  • William found out that someone used his report on american culture without his permission. what is william a victim of?
    11·1 answer
  • graphic designers can compress files in different formats . One of the formats ensures that the quality and details of the image
    7·1 answer
  • Plz subscribe my yt gaming channel <br>FIREAZZ GAMING​
    8·2 answers
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • Can someone find out what this binary number thing is. Just find out the message, I'm having a difficult time
    13·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
  • Why does the media play such an important role in our personal freedom? Select 3 options.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!