1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
8

Accessing calendars, contact information, email, files and folders, instant messaging, presentations, and task lists over the in

ternet is called
Computers and Technology
2 answers:
AleksandrR [38]3 years ago
6 0
<span>The answer is cloud computing Cloud computing is a pretty simple concept with lots of variations and ramifications. Cloud computing in simple terms is the delivery of computing services like servers, software, storage and more over the internet. There are several ways to collaborate online. We can move beyond strict cloud storage and services into cloud-related communication tools.
Calendars, contact information, emails, files and folders, instant messaging, presentations, and task lists are the kind of communication tools that we are talking about. Not all these tools are strictly cloud based. Some might use the host’s proprietary while others are peer to peer in nature. Group members located anywhere around the world can use these tools to communicate with other members. </span>
Illusion [34]3 years ago
4 0
The answer is Cloud Computing.  It access calendars, contact information, email, files and folders, instant messaging, presentations, and task lists over the internet. This means, if you have a device and an internet connection, you can have your "office" anywhere, anytime.
You might be interested in
Which feature of a blog helps to store and retrieve older posts?
Rashid [163]
Could it be archive posts? I'm not sure, but I believe it's archive posts.
8 0
3 years ago
Read 2 more answers
What happens when a user updates a record after a developer creates a Workflow Rule declaratively that updates a field on an obj
Sindrei [870]

Answer:

d. The trigger is fired more than once.

Explanation:

What would happen in this situation is that the  trigger would be fired more than once. This is because the trigger will be fired when the user updates the record. It will also be fired when the process builder is run.

If the trigger fires more than once, this can be problematic for the developer. Therefore, it is better if the trigger fires just once, as this is the time when the present changes can be placed.

5 0
3 years ago
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
3 years ago
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which aud
fgiga [73]

Answer:

The audience development technique that best describe the process Nicolal wants to implement is;

C Pull technology

Explanation:

Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.

Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader

The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.

8 0
3 years ago
Classify the following skills: writing HTML code, evaluating color theory, using design principles.
noname [10]

Answer: It’s not soft skills

Explanation: My test did not tell me what the answer is

3 0
3 years ago
Read 2 more answers
Other questions:
  • Lisa granted the CREATE TABLE privilege WITH ADMIN OPTION to Sharon. Sharon granted the privilege to Bob. If Lisa’s privileges a
    13·1 answer
  • A. True
    7·1 answer
  • Write the definition of a method named countPos that receives a reference to a Scanner object associated with a stream of input
    13·1 answer
  • An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
    6·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Pls help! for computers edge 2021
    7·1 answer
  • Can someone help me answer this, I can’t fail tysm :)
    11·1 answer
  • What is the output for this program?
    12·1 answer
  • . When you ____________________ a word, you can use a single line, a double lines, a dotted line, or even a wavy line!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!