1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
8

Instead of typing out each co-worker's email address individually, you can use the Office Online People application to create a

__________.
collaborate
combined
folder
group
Computers and Technology
2 answers:
arsen [322]3 years ago
7 0

The answer is D) group

Ivahew [28]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
Where is the video card located in a computer?
Rama09 [41]
Video card??????????
3 0
3 years ago
Read 2 more answers
Int, char, bool, and double are all valid data types in c , true or false
arsen [322]
False. bool is in C++, ints are used in C.

6 0
3 years ago
What are some legal issues that can arise from the use of all social media?
Salsk061 [2.6K]

Answer:

  1. Copyright
  2. Defamation
  3. Cyberbullying

Explanation:

The first issue, that I would like to explain is Copyright. If you are imposing as a company on Social Media with a real name that is Copyrighted, the company will file a DMCA takedown notice which is the Digital Millennium Copyright Act

. Which can result in your Social Media being taken down, or by getting a fine, sued or even jailtime.

The second issue is Defamation, what Defamation is basically spreading false information about a company / business in real or online that hurts a companies reputation. If you commit this crime online you can face a lawsuit or even jailtime for one year.

Thirdly, cyberbullying. This is illegal in most states in the US. Cyberbullying is a serious matter and depending on your states laws can be charged with criminal harassment.

Sources:

Quora: (Website)

Miclaw: (Website)

Statista: (Website)

7 0
3 years ago
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
allochka39001 [22]

Answer:

hybrid

Explanation:

A hybrid attack is a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.

7 0
3 years ago
Help??????????????????
romanna [79]
8,5,3,6,1,2,7,4 there you go bud

7 0
3 years ago
Other questions:
  • Consider the following method: public static void arrayMystery(int[] array) { for (int i = 0; i < array.length - 1; i++) { if
    10·1 answer
  • P**nhub or x-videos or other
    9·1 answer
  • What properties make it suitable to be used for musical instruments?
    8·1 answer
  • Which of the following is NOT a strength of monetary policy?
    15·1 answer
  • Help me plssssss which rule should be followed to stay safe online
    7·2 answers
  • The purpose of​ a/an _________ system is to capture best practice solutions and program them into a set of rules in a software p
    13·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    14·2 answers
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
  • HELP THIS IS SO DIFFICULT
    10·2 answers
  • If you want to remove the autocorrect options button from the screen, you can press the ____ key.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!