1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
11

Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project

teams consist of employees based in various regions and require frequent communication and coordination. The teams frequently exchange documents over e-mail, with multiple users making changes to a particular document. As a result, there are often multiple copies of a particular document in existence. Which of the following will allow the teams to share documents in such a way that they can keep track of the changes made to a particular document and note who made what change?
A) blogging
B) shared workspaces
C) instant messaging
D) cross-linking
Computers and Technology
1 answer:
Ilia_Sergeevich [38]3 years ago
4 0

Answer:

B) shared workspaces

Explanation:

Online workspaces (Shared workspaces) are spaces  on the internet that allows teams to share Google Docs, research, files, task lists, or anything else related to a project they are working on.

Shared workspaces provides tools and environments to enable individuals or teams at different locations virtual workers to collaborate together in real time. These forms of shared workspaces can include virtual meetings, exchange of emails,  videos, and any real-time collaborative virtual space.

You might be interested in
Polymorphism means (Points : 2) many forms
Pavel [41]

Answer:

many forms

Explanation:

Polymorphism is a construct in object oriented programming which means multiple forms.For example: Suppose I have a function which performs the add operation on two integers and another function with the same name which concatenates 2 given strings:

  • int add ( int a, int b);
  • string add ( string a , string b)

The two functions represent polymorphic forms of the add function. The function to be invoked at runtime is determined by the runtime argument type.

For example , add (2,3) will invoke int add ( int a, int b);

Similarly, add("hello","world") will invoke string add ( string a , string b);

6 0
3 years ago
Anyone can help me with this?
dybincka [34]

Answer:

/*

 Find Largest and Smallest Number in an Array Example

 This Java Example shows how to find largest and smallest number in an  

 array.

*/

public class FindLargestSmallestNumber {

 

public static void main(String[] args) {

 

//array of 10 numbers

int numbers[] = new int[]{32,43,53,54,32,65,63,98,43,23};

 

//assign first element of an array to largest and smallest

int smallest = numbers[0];

int largetst = numbers[0];

 

for(int i=1; i< numbers.length; i++)

{

if(numbers[i] > largetst)

largetst = numbers[i];

else if (numbers[i] < smallest)

smallest = numbers[i];

 

}

 

System.out.println("Largest Number is : " + largetst);

System.out.println("Smallest Number is : " + smallest);

}

}

 

/*

Output of this program would be

Largest Number is : 98

Smallest Number is : 23

*/

Explanation:

5 0
3 years ago
Whenever you are designing a project for commercial use (making money) and need to use photographs with people in them you must
Leya [2.2K]

Answer:

Copyright

Explanation:

7 0
3 years ago
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
What is the purpose of OPPA? A. It regulates the strength of passwords chosen by the users. B. It prohibits the use of informati
Anna35 [415]

The purpose of OPPA is to make its mandatory for companies to disclose what kind of information they will acquire from their users.

D. It makes it mandatory for companies to disclose what kind of information they will acquire from their users.

<u>Explanation:</u>

OPPA is a Online Privacy Protection Act. It gathers data from individuals who use or visit your site and use it to execute business with them. A few organizations use client data for their very own inner showcasing purposes, for example, to figure out what sort of items or administrations to offer whenever the client utilizes the site or to create focused on arrangements of clients who have similar likes or aversions.

It makes it obligatory for organizations to reveal what sort of data they will secure from their clients. It likewise incorporates data, for example, name, road address, email address, phone number, date of birth, Social Security number, or different insights concerning an individual that could enable a customer to be reached physically or on the web.

6 0
4 years ago
Other questions:
  • A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-ave
    14·1 answer
  • SI TENGO: ¿R = 255, G0 =, B = 0, QUE COLOR OBTENGO?
    14·1 answer
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • What are some of the advantages of using the F measure (weighted harmonic mean) over using the Precision &amp; Recall when evalu
    15·1 answer
  • Often used in connection with a business
    6·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • Why is it so important to have employees who can critically think?
    7·2 answers
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!