1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
11

Jared recently sent an email to all the members of his department asking them for their opinions about where the department shou

ld have its quarterly team lunch. The response was overwhelming as Jared received more than 40 suggestions. This is an example of ________.
Computers and Technology
1 answer:
Romashka [77]3 years ago
8 0

Answer:

i will team corporation right for lunch

Explanation:

You might be interested in
Which option allows you to customize the order of your data ?
Vladimir [108]

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

                  Hello!

✧・゚: *✧・゚:*    *:・゚✧*:・゚✧

❖ The correct answer choice is B) sorting. When you sort, you can order your sheet however you'd like.

~ ʜᴏᴘᴇ ᴛʜɪꜱ ʜᴇʟᴘꜱ! :) ♡

~ ᴄʟᴏᴜᴛᴀɴꜱᴡᴇʀꜱ

8 0
4 years ago
Read 2 more answers
Steps for turning off two step verification on ,for example, iPhones.
Tems11 [23]

Answer:

Step 1: Visit iCloud.com and log in with your Apple ID and password

At the same time, a window also pops up on iDevice

you need to click "Allow"

Copy the code from your phone to icloud.com

Step 2: Once signed in, select Settings on homepage

Step 3: Click "Manage" Apple ID.

Step 4: You will be directed to another site – appleid.apple.com

input your password to log in and verify it with Apple ID verification code.

Step 5: Then you will enter the manage page.

Click "Edit" in Security column.

Step 6: Click "Turn Off Two-Factor Authentication"

then confirm it.

Step 7: Then you need to select your security questions and answer them

click "Continue" after confirming your birthday and rescue email.

After all of these steps, you have turned off two factor authentication for Apple ID successfully.

Source : https://www.imobie.com/guide/anytrans/how-to-turn-off-two-step-verification-in-icloud.htm

8 0
3 years ago
) Briefly describe the purpose of the DASH protocol in streaming videos.
Dennis_Churaev [7]

Answer:

The purpose of the DASH protocol in the streaming videos are that it provide the high quality for the streaming media content from the HTTP servers.

DASH stands for the dynamic streaming over HTTP and it is a standard for the steaming over the HTTP that has potential for replacing the various technology. It is basically produces various on demand resources file depending upon the processing power and the bandwidth of the delivery to the clients.

3 0
4 years ago
Name the different types of constructors that a designer can provide in a class. Provide an example with a class showing many co
Marrrta [24]
By default, if you do not implement a constructor, the compiler will use an empty constructor (no parameters and no code). The following code will create an instance of the MyObject class using the default constructor. The object will have the default vauesfor all the attributes since no parameters were given.

MyObject obj = new MyObject();

Another type of constructor is one with no parameters (no-arg constructor). It is similar to the default, except you actually create this constructor. The contents of the the constructor may include anything. To call a no-arg constructor, use the same line of code as above. The constructor can look like the one below:

public MyObject() {
System.out.println("This is a no-arg constructor");
}

Lastly there is the parameterized constructor. This type of constructor takes in parameters as inputs to assign to values in the newly created object. You call a parameterized constructor as follows:

MyObject obj = new MyObject("Bob", 20);

The constructor will look like this:

public MyObject(String name, int age) {
this.name = name;
this.age = age;
}

In the constructor, the keyword "this" refers to the object, so this.name is a private global variable that is being set equal to the inputted value for name, in this case "Bob".

Hope this helps!
8 0
3 years ago
What is the default junk email protection in Outlook 2016?
Shtirlitz [24]
The answer to ur question is D
4 0
3 years ago
Read 2 more answers
Other questions:
  • For what show did the actor, whose star is located at 6667 Hollywood Boulevard, earn an Emmy Award for Outstanding Supporting Ac
    10·2 answers
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    10·1 answer
  • Checking tire pressure should be performed:
    11·2 answers
  • And there you go <br> sorry its saying my thing is tooo small
    14·2 answers
  • What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the
    15·1 answer
  • What is considered necessary to establish OSHA
    5·1 answer
  • Which type of computer graphic can be blown up to a much larger size without getting distorted or losing quality?
    5·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • Which sensitivity level is not a default available in Outlook 2016?
    9·2 answers
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!