1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
10

What is the best platform for a online meeting?

Computers and Technology
2 answers:
rusak2 [61]3 years ago
8 0

Answer: Online  Platforms

Explanation:

Google,Adobe,Skype for Business, Join.me

Mice21 [21]3 years ago
7 0

Answer: at the moment i would pick between zoom and something by google

Explanation: Face time is not very useful as only apple users can use other things like house party and the Instagram face chat thing are not good for a professional setting. Skype has been giving me problems with the vast amount of people on it for work.

You might be interested in
A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
OLga [1]
B. Percent of patches applied in the past 30 days
6 0
3 years ago
Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
choli [55]

Answer:

The correct program to this question can be given as:

Program:

//header file

#include<iostream> //include header file

using namespace std;

//main

int main() //defining method main

{

double radius,area=0; //defining variables

double PI=3.14; //defining variable PI and assign value

cout <<"Enter the radius: "; //message

cin >> radius; //input value by user

area = PI * radius * radius; //formula to calculate area

cout << "Area: "<< area << endl; //print area

return 0;

}

Output:

Enter the radius: 3.0

Area: 28.26

Explanation:

In the above program code, a header file is included. In the next line, the main method is defined, which contain three double type variable that is "radius, area, and PI".

  • The radius variable is used to take input by the user, and the area variable is to calculate the area of the circle, and the PI is used to hold a constant value, which is "3.14".
  • After taking user input in radius variable the area variable has used the formula of the circle, which calculates a value and in the last print, the function uses "cout", that prints area variable value.
8 0
2 years ago
Describe the different non-printing characters,​
irakobra [83]

Answer:

or formatting marks are characters for content designing in word processors, which aren't displayed at printing. It is also possible to customize their display on the monitor. The most common non-printable characters in word processors are pilcrow, space, non-breaking space, tab character etc.

Explanation:

5 0
3 years ago
What is the code for loading image in matlab
MA_775_DIABLO [31]

Answer: Using imread command

Explanation:

For loading images in matlab we can use the imread command. Some example regarding how to use the code is as follows:

A = imread('ball.tif');

Here suppose the image file name is saved as ball and is in tif format. Here the image is stored in an array named A.

We can view the image using

imshow(A);

7 0
3 years ago
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • write a program using if condition and print fail and try again if student marks are less than 33 using if condition and print f
    5·1 answer
  • Explain what all sensory receptors have in common.
    14·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write yo
    8·1 answer
  • Which method is used for resolving data dependency conflict by the compiler itself?
    6·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • Terence creates software requirements specification (SRS) documents for various software development projects. In which phase of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!