1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
11

Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o

f the purpose of boundary objects?
Computers and Technology
1 answer:
Alex17521 [72]3 years ago
7 0

Boundary objects can be used in many principles and have different meanings but their structure is the same. The best definition to boundary objects is; any object that is part of multiple social worlds and is plastic enough to adapt to local needs and the constraints of several parties employing them. When commonly used, they are weakly structured. However, they become strongly structured in individual-site use.

You might be interested in
How long does it take rblx to re open deleted acc
dedylja [7]

Answer:

(Probably) unknown

Explanation:

First off, you have to get rblx to agree to re-open a deleted, which I can imagine would take a herculean effort and most likely a stream of emails and phone calls. If they happen to archive deleted accounts, they may be able to recover it, but this is done by humans, so there is no definitive way to find out how long it would take a human to do this. If deleted accounts aren't archived, then you're outta luck because they won't be able to get it back.

4 0
3 years ago
Read 2 more answers
From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
mixer [17]

Answer:

Explanation:

A subdomain is really important on the internet, we can categorize our blog, e-commerce or simple informative website, for example, if we want to have a blog and e.commerce of the same topic, we can have a subdomain for each website, if we separate our website, and we administrate our content is a good signal for SEO, we could have more promotion in search engine.

4 0
4 years ago
scientist think that two species with homologous structures probably had ____ A. Ancestor B. Fossil C. Environment D. Offspring
Gennadij [26K]
 the answer is  A : ancestor 
8 0
3 years ago
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
Consider a physical address with a page frame size of 2kb. how many bits must be used to represent the page-frame offset of the
MArishka [77]
11 bits would be enough for 0 - 2047 decimal, 2048 (2k) possible values. 2048 itself would need a 12 bit, which would allow from 0 - 4095 possible values. Useful tidbit to remember: 1024, 1k is ten bits.
7 0
4 years ago
Other questions:
  • The government department responsible for laws concerning work is the
    12·1 answer
  • central, secure database in which Windows stores hardware and software configuration information and system security policies is
    12·1 answer
  • Which command group on the Slide Master tab is used to add headers, footers, and other placeholders to the slide
    13·2 answers
  • Is it true or false 1-5
    13·1 answer
  • How tractors are controlled
    8·2 answers
  • In a typical day, what types of Computer-Mediated Communication do you use?
    8·1 answer
  • What extra dimension do 3D objects have that 2D objects do not have?<br><br> help
    7·1 answer
  • Technology?
    9·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    11·1 answer
  • iv. Assuming the above operating system that cannot perform memory deallocation. Name at least three effects on the overall syst
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!