1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
2 years ago
9

Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.

Computers and Technology
2 answers:
Vsevolod [243]2 years ago
6 0
<span>Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. 
The answer is a. True 

</span>
user100 [1]2 years ago
4 0
The statement "Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents" is true. This is correct because there are many types or media that can be taught to people and the only one that matters is on how they understand and interpret these information to gain knowledge.
You might be interested in
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Sending an identical message in an e-mail blast to all customers is an example of
disa [49]

Answer:

Broadcast message

Explanation:

A broadcast message is an identical message sent to a lot of recipients. When it is an email, it can be sent in Carbon Copy (Cc) or a Blind Carbon Copy (Bcc) form.

With the<em> Carbon Copy</em>, every recipients will be notified about the other recipients. In most cases all the email usernames of the recipients will be sent to all the recipients individually.

With the <em>Blind Carbon Copy</em>, every individual sees the message as he/she received it alone. The individual is not notified about the other recipients.

8 0
3 years ago
Taking phrases, sentences, or paragraphs of text from a source then using them without giving attribution is plagiarism. This in
lys-0071 [83]

Answer:

True, that would be plagiarism

8 0
2 years ago
The power on any voltage rail of the hard drive is calculated by multiplying _____. (a). Voltage X Current (b). Voltage X Watts
Papessa [141]

Answer:

(a). Voltage X Current

Explanation:

Power -

In the concept of physics , power is denoted by P ,

Power = Voltage * Current

Power = V * I

The unit is Ampere  *  Voltage

Power is defined as the rate of work done , i.e. , work divided by time .

Power = work / time .

Power is a scalar quantity .

The standard unit of power is Watt , which is denoted by W .

6 0
2 years ago
Each time the ENTER key is pressed, Word creates a new paragraph. T/F
Sergio [31]
When you hit enter key you will create new paragraph so answer is true
4 0
3 years ago
Other questions:
  • Which line of code will generate a random integer between 7 and 77?
    10·1 answer
  • Does anyone have the problem where you try to watch a video to get your answer but it brings up a thing asking your gender to ma
    6·1 answer
  • PLEASE HELP ASAP<br> Which technology encrypts traffic between a web browser and a website?
    10·2 answers
  • Which osi/iso layer is responsible for determining the best route for data to be transferred?
    5·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • Explain the term creating in word processing​
    12·1 answer
  • Responsible use of computer is known as ................. .​
    11·1 answer
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
  • During the ___ phase of a software development project, members broadly define the features that the software should include
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!