answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
2 years ago
12

1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the

internet is called
A. Cloud computing


B. Social networking


C. Text messages


D. Web conferencing



2. Tanya is working on a science project with three other people. They are having a difficult time coordinating their schedules, but it's important they all meet to discuss their roles and responsibilities. What communication technology would be most efficient?


A. Cloud computing


B. Emailing


C. Social networking


D. Web conferencing



3. The bar across the top of an Office Online program that allows users to find the commands to complete a task is called the____.


A. Button


B. Clipboard


C. Ribbon


D. Task list



4. Which of the following Office Online apps is most effective for creating multi-media presentations?


A. Calendar


B. Cloud computing


C. Outlook


D. PowerPoint



5. Sandie is writing a report for her environmental science class. She has asked her older sister who is away at college to proof her writing and add comments to point out errors and areas that could be improved. What is the most efficient way for Sandie and her sister to collaborate on the document?


A. Sandie should email her sister a picture of the report and ask her sister to email a picture of her comments on the report.


B. Sandie should share the document in OneDrive and give her sister permission to edit the document.


C. Sandie should scan the document and email it to her sister.


D. Sandie should enlist help of someone who lives near her



6. Ergonomics is defined as?


A. the affordability of office equipment


B. the decor in a workplace


C. the design and arrangement of items for efficiency and safety


D. the economic benefit of home workspaces
Computers and Technology
1 answer:
Veseljchak [2.6K]2 years ago
6 0
1. Cloud Computing
2. Web Conferencing
3. Ribbon
4. PowerPoint
5. Sadie should share the document in One Drive and give her sister permission to edit the document
6. The design and arrangement of items for efficiency and safety
You might be interested in
The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
dangina [55]

Answer:

The method definition to this question can be given as:

Method definition:

public void clear(int[] arr, int num) //define method clear.

{

   if (num == 0) //if block

{

       return 0;  return value.

}

else //else block

{

 arr[num - 1] = 0; //assign value in arr.

return arr[];  //return value.

}

}

clear(arr, num - 1);   //calling

Explanation:

The description of the above method definition as follows:

  • Firstly we define a method that is "clear" that does not return any value because its return type is "void". This method accepts two integer variables that are "arr[] and num" where arr[] is an array variable and num is an integer variable.
  • Inside a method, we use a conditional statement in if block we check that num variable value is equal to 0. if this condition is true so, it will return 0 otherwise it will go to else block in else block it will assign value in variable arr[num-1] that is "0" and return arr value.

4 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
2 years ago
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
2 years ago
Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
NISA [10]

Answer:

#include <iostream>

using namespace std;

void CoordTransform(int *ptr1, int *ptr2);

int main()

{

   int xVal;

int yVal;

cout<<"please enter two valid integers";

cin>>xVal;

cin>>yVal;

CoordTransform(&xVal , &yVal);

int xValNew=xVal;

int yValNew=yVal;

cout<<xValNew<<yValNew;

   

   return 0;

}

void CoordTransform(int *ptr1, int *ptr2)

{

int a = *ptr1;

*ptr1=(*ptr1+1)*2;

*ptr2=(*ptr2+1)*2;

}

Explanation:

It will return new values in previously defined variables

coding language: c++

3 0
2 years ago
Read 2 more answers
Which of the following is not one of the four criteria for evaluating websites?
Flura [38]

Answer:validity

Explanation:

Because it dont sound right

5 0
2 years ago
Other questions:
  • Which description of the plain text file format is most accurate?
    11·2 answers
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • In evaluating the precedence rules used by Python, what statement is accurate? a. Addition and subtraction are evaluated after a
    8·2 answers
  • The ______ network became functional in 1969, linking scientific and academic researchers across the United States. Group of ans
    7·2 answers
  • Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argum
    10·1 answer
  • Joe, Kate and Jody are members of the same family. Kate is 5 years older than Joe. Jody is 6 years older than Kate . The sum of
    11·2 answers
  • Write a method that will receive 2 numbers as parameters and will return a string containing the pattern based on those two numb
    10·1 answer
  • In an IPv4 datagram, the fragflag bit is 0, the value of HLEN is 5 (Its unit is word or 32-bits ), the value of total length is
    10·1 answer
  • Which group contains the command to manually conduct a spell check ?
    9·1 answer
  • Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular lan
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!