1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
3 years ago
10

In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message

Computers and Technology
1 answer:
Vesna [10]3 years ago
6 0
Let's say that you are the leader of software engineers which will work on a big project this coming Monday and you just posted this valuable information in your professional online group as a group status but because of an unforseen reason, you had to cancel this for Tuesday since the management deemed that the project was prematurely thought off. Just imagine the inconvenience of having to  notify everyone in the team  that it will be cancelled when you can just revise the post and leave a "last editted on" phrase just below the message.

Also, what if you ordered something online and just a few moments later you found out the descriiption of the item unfortunately doesn't match the criteria of what you truly want to purchase? Just imagine the inconvenience of waiting for the shipment to arrive before you can cancel the transaction and return it to the company.


You might be interested in
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y
ElenaW [278]
<span>a. uncheck ���hide protected operating system files��� in folder options</span>
6 0
3 years ago
1. Answer the following questions: a. What are the different types of number system? Name them.​
BigorU [14]

Answer:

binary,decimal, hexadecimal and octal number system

5 0
3 years ago
____ is an easy way to invitation through a web page​
Agata [3.3K]

Answer:

RSVP?

Explanation:

6 0
3 years ago
Read 2 more answers
What command line utility can be used to repair the bcd on a windows installation?
Afina-wow [57]
You can use the following command Bootrec /rebuildbcd
8 0
3 years ago
Other questions:
  • If the wrong server edition is installed, what command can be used to change to a different edition?​
    5·1 answer
  • Describe Ms word environment.​
    14·1 answer
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • NAND is logically complete. Use only NAND gates to constructgate-level circuits that compute the
    7·1 answer
  • What is an example of CT SO?
    9·1 answer
  • Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
    6·1 answer
  • Write a program that takes a decimal number from the user and then prints the integer part and the decimal part separately. For
    13·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!