1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
7

1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the

internet is called
A. Cloud computing
B. Social networking
C. Text messages
D. Web conferencing

2. Tanya is working on a science project with three other people. They are having a difficult time coordinating their schedules, but it's important they all meet to discuss their roles and responsibilities. What communication technology would be most efficient?
A. Cloud computing
B. Emailing
C. Social networking
D. Web conferencing

3. The bar across the top of an Office Online program that allows users to find the commands to complete a task is called the____.
A. Button
B. Clipboard
C. Ribbon
D. Task list

4. Which of the following Office Online apps is most effective for creating multi-media presentations?
A. Calendar
B. Cloud computing
C. Outlook
D. PowerPoint

5. Sandie is writing a report for her environmental science class. She has asked her older sister who is away at college to proof her writing and add comments to point out errors and areas that could be improved. What is the most efficient way for Sandie and her sister to collaborate on the document?
A. Sandie should email her sister a picture of the report and ask her sister to email a picture of her comments on the report.
B. Sandie should share the document in OneDrive and give her sister permission to edit the document.
C. Sandie should scan the document and email it to her sister.
D. Sandie should enlist help of someone who lives near her

6. Ergonomics is defined as?
A. the affordability of office equipment
B. the decor in a workplace
C. the design and arrangement of items for efficiency and safety
D. the economic benefit of home workspaces
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
7 0
The answer is B hope this helps :)
You might be interested in
Why are resources limited? Why can't we get everything all the time?
wel
I believe the answer is B
6 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
According to Newton's Second Law of Motion, when an object is acted on by an unbalanced force, how will that object respond?
Murrr4er [49]
A. It will decrease speed
5 0
3 years ago
How is abstraction used in a GPS system
ipn [44]
The designs on the map of the GPS system Im would think but can you be more specific?
8 0
4 years ago
Read 2 more answers
Sending a busy manager a long email represents a problem in which area of the communication process
FromTheMoon [43]
Time management,they wouldn’t have enough time to read it and they would become more stressed out
3 0
4 years ago
Other questions:
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • What's the 16-bit hexadecimal representation of the signed decimal integer, -331? Answeers?
    14·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • How to send an email
    7·2 answers
  • Anyone wanna play roblox?? My user is Tsvetok_luis
    11·2 answers
  • Fatal error: Class 'Drush\Commands\DrushCommands' not found in /Users/amy/testsite/Sites/acquia dev desktop/fresh-install/module
    7·1 answer
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • Nonverbal communication includes _____.
    9·2 answers
  • The way a student prepares for a test or reviews academic material is referred to as
    8·2 answers
  • A class is a type of object that defines the format of the object and the actions it can perform. True False
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!