1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
6

Which of the following is productivity strategy for collaboration?

Computers and Technology
1 answer:
mixer [17]3 years ago
8 0

Which of the following is a productivity strategy for collaboration?

  • A. Saving focused work for a time of day when you feel most creative.
  • B. Employing the 80/20 rule to prioritize tasks.
  • C. Posting files to a web-based shared site.
  • D. Using white noise to block distractions in the office.

<u>Answer:</u>

Posting files to a web-based shared site is a productivity strategy for collaboration.

  • C. Posting files to a web-based shared site.

<u>Explanation:</u>

Collaborative software or groupware is application programming intended to help individuals taking a shot at a typical errand to achieve their objectives. This permits individual to impart thoughts and their abilities to different individuals with the goal that the assignment can be done both proficiently and adequately.

Joint effort stages ordinarily incorporate an email customer, Web conferencing, internet based life sharing, video capacities, report sharing abilities, texting and that's just the beginning. Endeavor joint effort stages are intended to be introduced on-premises or conveyed by means of the Web as cloud-based administrations.

You might be interested in
Consider the following code segment. for (int a = 0; a &lt; 10; a++) { for (int b = 10; b &gt; a; b--) { System.out.print("#");
Ket [755]

Answer:

55

Explanation:

Given the codes as below:

  1.        for (int a = 0; a < 10; a++)
  2.        {
  3.            for (int b = 10; b > a; b--)
  4.            {
  5.                System.out.print("#");
  6.            }
  7.        }

There are two layer loops in the code. The outer loop (Line 1) will run for 10 iterations by traversing through a = 0 to a=9. However, the inner loop  (Line 3) will run for 10 + 9 +  8 + 7 +...+ 1 = 55 iterations.

Since the print statement is within the inner loop (Line 5) and therefore the number of printed "#" symbols is dependent on the number of iterations of the inner loop. There will be 55 "#" symbols printed.

6 0
3 years ago
You can use this effect to break a color into a percentage of its full strength.
Dmitriy789 [7]
The answer on this scenario would then be c. drop out. This effect can be done if one wants to break a color into one's percentage of the full strength. Hope this is the answer and would be of big help.
6 0
3 years ago
Write a program that rolls two dice until the user gets snake eyes. You should use a loop and a half to do this. Each round you
marishachu [46]

import random

num_rolls = 0

while True:

   r1 = random.randint(1, 6)

   r2 = random.randint(1, 6)

   print("Rolled: " + str(r1) + "," + str(r2))

   num_rolls += 1

   if r1 == r2 == 1:

       break

print("It took you "+str(num_rolls)+" rolls")

I added the working code. You don't appear to be adding to num_rolls at all. I wrote my code in python 3.8. I hope this helps.

4 0
3 years ago
The expectations I would discuss with Erica regarding the usage of the internet
ryzh [129]

Answer:

Tell her about cyber bullies

Tell her about hackers

stalkers

identity theft

spam

Sorry if wrong

Explanation:

8 0
3 years ago
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • Compare and contrast how the roles of women and men in society are changing​
    14·1 answer
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • Which type of hypervisor does not run on an underlying operating system?
    13·1 answer
  • The _____ function is a logical function that returns a TRUE value if any of the logical conditions are true and a FALSE value i
    10·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • HP laptop computers are produced on a line, with multiple workers completing one or two specific tasks to assemble the laptop. T
    15·1 answer
  • The ability to understand a person's needs or intentions in the workplace is demonstrating
    5·1 answer
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
  • Question #3
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!