1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
4 years ago
9

While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea

m. At the meeting, everyone works together to identify what is missing, define what needs to be done, and assign tasks.
What is this called?
Computers and Technology
1 answer:
alexgriva [62]4 years ago
4 0

Answer:

Teamwork

Explanation:

You might be interested in
This Command to insert copied text anywhere in your document
harina [27]

Answer:

Paste

Explanation:

6 0
3 years ago
Read 2 more answers
What is network management?
melamori03 [73]
Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  <span />
3 0
4 years ago
You are applying for a secretary position. You have many skills but which of the following would not be one to include on the ap
zepelin [54]

A. How many marathons you have run, because it doesn't relate to the job you're applying for.

6 0
3 years ago
Read 2 more answers
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
What is the name of the file in which this
anyanavicka [17]

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

3 0
3 years ago
Other questions:
  • Discuss how and why video game hardware affects game design and where you think the next generation of platforms will change tho
    9·1 answer
  • Organisms are classified as producers or consumers acorrding to the way they
    11·2 answers
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    12·1 answer
  • 1024 Megabytes = ____________
    14·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • When replacing a system board in a laptop, which feature is a must?
    7·1 answer
  • Reports produced by the United Nations are considered
    11·2 answers
  • True or false altering iso will affect the area of focus in a photo
    13·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!