1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
11

Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o

f the purpose of boundary objects?
Computers and Technology
1 answer:
Alex17521 [72]3 years ago
7 0

Boundary objects can be used in many principles and have different meanings but their structure is the same. The best definition to boundary objects is; any object that is part of multiple social worlds and is plastic enough to adapt to local needs and the constraints of several parties employing them. When commonly used, they are weakly structured. However, they become strongly structured in individual-site use.

You might be interested in
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
What is the purpose of HTML?
Basile [38]
You can style and structure with it so it’s either one of those
3 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
________ are found on the motherboard and are used to attach your hard disk.
Naya [18.7K]
<span>SATAs are found on the motherboard and are used to attach your hard disk.
</span>The SATA standard is most often used today by hard drives to communicate with a system motherboard. SATA stands for <span>Serial AT Attachment.
</span>It is a computer bus<span> interface that connects </span>host bus adapters<span> to </span>mass storage devices<span> such as </span>hard disk drives<span>, </span>optical drives<span>, and </span>solid-state drives<span>.</span>

4 0
3 years ago
A block signature indicating that a text message was typed on a mobile device is an example of ____________.
Katarina [22]

A block signature indicating that a text message was typed on a mobile device is an example of  <u>impression management</u>.

The correct option is A.

<h3>What is  impression management?</h3>

Impression management is a conscious or unconscious process whereby individuals strive to regulate and control information in social interactions in order to affect how others perceive a person, an item, or an event.

<h3>What is the main goal of impression management?</h3>

The actions people take to influence others' perceptions of a notion are referred to as impression management. Depending on their objectives, people can work to reinforce existing beliefs or make an effort to change them.

<h3>What is block signature?</h3>

A signature block is the text that surrounds a signature and offers context for the signature as well as additional details. An email message, Usenet article, or forum post's signature block is a customized block of text that is automatically attached at the bottom of these types of documents.

To know more about  block signature visit:

brainly.com/question/2123747

#SPJ4

I understand that the question you are looking for is :

A block signature indicating that a text message was typed on a mobile device is an example of ____________.

A. impression management

B. convergence

C. evaluative language

D .pragmatic rules

6 0
2 years ago
Other questions:
  • The analysis of how people relate to each other is known as?
    6·1 answer
  • The program needs a Frisbee Golfer class.
    15·1 answer
  • What feature would be used to collect how many times users downloaded a product catalog?
    11·1 answer
  • Regarding the systems development​ process, ________ addresses the​ question, "Is the system producing the desired​ results?"
    12·1 answer
  • A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to
    10·1 answer
  • Anyone know the name of this font? and what site i can find it on so i can type it????
    8·1 answer
  • In attempts to improve their contribution to the environment, a company decided to adapt to green computing. Which of these tech
    15·1 answer
  • Please help to question 16 and 17 please
    10·1 answer
  • What is the use of comma and semicolon with print statement ?​
    11·1 answer
  • Select the tasks that would be performed by an information systems graduate.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!