1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
12

__________ is a program that lets you share documents online with others.

Computers and Technology
2 answers:
melisa1 [442]3 years ago
6 0
Google Drive is for sharing documents such as powerpoints.
almond37 [142]3 years ago
5 0

Answer:

Google Drive

Explanation:

Google Drive has a variety of folders such as shared documents

You might be interested in
Scanner can be used to read tokens from a String literal Scanner can be used to read tokens from the console window (user input)
Paladinen [302]

Answer:

Scanner can be used to read tokens from the console window (user input)

Explanation:

Scanner is a class used in some programming languages to obtain inputs from users.

It is mostly well developed in Java programming language and used exclusively for taking and obtaining inputs.

Scanner takes input in primitive types such as doubles, floats and integers. IT also takes string inputs.

Here is a code snippet where the class scanner is used:

         Scanner input = new Scanner (System.in)

The code above creates an object of the scanner class

7 0
4 years ago
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
Read 2 more answers
What are possible consequences for cyberbullying?
MrRa [10]

Answer:

Victims of cyberbullying are more likely than their peers to abuse alcohol and drugs, have physical and emotional health issues, and may suffer from low self-esteem. Poor grades in school is another consequence of cyberbullying that can also be accompanied by an attempt by the victim to avoid other children by refusing to go to school.

Explanation:

8 0
3 years ago
Read 2 more answers
Web-based applications are application software which operate and can be accessed through _____________. The World Wide Web Stor
bearhunter [10]

a web browser i think

4 0
4 years ago
Read 2 more answers
8. When requesting a review of a denied claim, it is required to send a _______________ with the claim.
liq [111]
I'd say an appeal letter.

An appeal letter should be sent with the claim to request for review of an insurance claim that has been denied or underpaid by an insurance company. An appeal is important because it lets the insurance company know that you disagree with the decisions they have issued



4 0
3 years ago
Other questions:
  • [PROGRAMMING] A ____ signal indicates that a specific amount of time should pass before an action starts.
    13·1 answer
  • How do you convert a decimal to binary?
    9·2 answers
  • Question 12 (1 point)
    6·1 answer
  • Write an assembly language program with a loop and indexed addressing that calculates the sum of all the gaps between successive
    11·1 answer
  • List of steps to apply bold and italic formatting to a word​
    9·2 answers
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • Can I change my username?
    6·1 answer
  • You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
    14·1 answer
  • Ryo currently earns a monthly salary of $2200. She has been offered a raise of $250 per month. How much more will she earn per y
    14·1 answer
  • What three files do you need to perform a mail merge?<br><br> HELP ASAP PLEASE!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!