1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
7

When a person uses terms such as “LOL” to mean “Laughing out loud,” they are using a(n):

Computers and Technology
2 answers:
gayaneshka [121]3 years ago
5 0
An initialism or an acronym. Hope this helps :)
deff fn [24]3 years ago
5 0
When using lol to mean laugh out loud? That would be an acronym
You might be interested in
___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
mamaluj [8]
Artificial Intelligence
5 0
3 years ago
The tone a writer takes is referred to as the writing _____.
ch4aika [34]
Atmosphere or mood!
 i really hope this is it


6 0
3 years ago
Read 2 more answers
What is a break in the content that forces takes on to the next line
Dovator [93]

I DONT KNOW AT All what so ever


7 0
4 years ago
Read 2 more answers
Which of the following is productivity strategy for collaboration?
mixer [17]

Which of the following is a productivity strategy for collaboration?

  • A. Saving focused work for a time of day when you feel most creative.
  • B. Employing the 80/20 rule to prioritize tasks.
  • C. Posting files to a web-based shared site.
  • D. Using white noise to block distractions in the office.

<u>Answer:</u>

Posting files to a web-based shared site is a productivity strategy for collaboration.

  • C. Posting files to a web-based shared site.

<u>Explanation:</u>

Collaborative software or groupware is application programming intended to help individuals taking a shot at a typical errand to achieve their objectives. This permits individual to impart thoughts and their abilities to different individuals with the goal that the assignment can be done both proficiently and adequately.

Joint effort stages ordinarily incorporate an email customer, Web conferencing, internet based life sharing, video capacities, report sharing abilities, texting and that's just the beginning. Endeavor joint effort stages are intended to be introduced on-premises or conveyed by means of the Web as cloud-based administrations.

8 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
Other questions:
  • Why is there a need to compare and align one's PECs of a successful entrepreneur?
    5·1 answer
  • What is an example of a good URL?
    7·2 answers
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • Write a program that allows two players to play a game of tic-tac-toe. Use a two dimensional char array with three rows and thre
    7·1 answer
  • Adding Page Numbers in the Footer
    15·1 answer
  • Which conditions make using an array a better choice than a list? Select 3 options.
    12·2 answers
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
  • The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letter
    12·1 answer
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!