answersLogoWhite

0


Best Answer

Celcom Systems Group is a private company that specializes in information system databases. These include cellular, mobile and internet based information systems.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How the Celcom use the information system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

When was Celcom created?

Celcom was created in 1988.


Is Celcom an oligopoly?

No, it is not.


Who are the celcom customer?

Celcom is a cellphone service provider, Celcom's customer must be the people who need the service, they must be from all level of age,profesional,race,religion,financial background and education.


What is the weakness of celcom?

unstable line


What is a public information system?

An public information system is a system set for the use for the public. It infroms them on a certain information they are looking for.


What a Public Information System?

An public information system is a system set for the use for the public. It infroms them on a certain information they are looking for.


What is public information system is?

An public information system is a system set for the use for the public. It infroms them on a certain information they are looking for.


Where does Celcom offer services to?

The malaysia based telecommunications company Celcom offers services only to malaysian customers and claims to cover most of Johor Bahru, Klang Valley, Penang, Pelaka and Kulim.


What is a public system?

An public information system is a system set for the use for the public. It infroms them on a certain information they are looking for.


What part do people play in the information system?

they use information system to make their work easy


What is the meaning of information system?

an public information system is a system set for the use for the public it informs them on a certain informationthey are looking for.


What is the attempted or successful unauthorized access use disclosure modification or destruction of information or interference with system operations in an information system called?

The attempted or successful unauthorized access, use, disclosure, modification or destruction of information or interference with system operations in an information system is called: