1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
2 years ago
11

Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project

teams consist of employees based in various regions and require frequent communication and coordination. The teams frequently exchange documents over e-mail, with multiple users making changes to a particular document. As a result, there are often multiple copies of a particular document in existence. Which of the following will allow the teams to share documents in such a way that they can keep track of the changes made to a particular document and note who made what change?
A) blogging
B) shared workspaces
C) instant messaging
D) cross-linking
Computers and Technology
1 answer:
Ilia_Sergeevich [38]2 years ago
4 0

Answer:

B) shared workspaces

Explanation:

Online workspaces (Shared workspaces) are spaces  on the internet that allows teams to share Google Docs, research, files, task lists, or anything else related to a project they are working on.

Shared workspaces provides tools and environments to enable individuals or teams at different locations virtual workers to collaborate together in real time. These forms of shared workspaces can include virtual meetings, exchange of emails,  videos, and any real-time collaborative virtual space.

You might be interested in
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
QUESTION 9 of 10: Bob charged $200 for a plane ticket last month. When he received his statement, he saw that he could pay the m
IgorLugansk [536]

Answer:

yes cuz 25x8=200

Explanation:

3 0
3 years ago
Read 2 more answers
To maintain your body temperature, your body converts chemical potential energy into thermal energy T or F
PilotLPTM [1.2K]
True
This is physics btw
CPE --> TE
4 0
3 years ago
In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
Lilit [14]

Answer:

ansList =input().split() #get input and split it by space

ansList = [int(i) for i in ansList if int(i)>0] #turn string to integer,and get all positive integers

print(ansList)

Explanation: I think this would work for you. I leace comments in the answer.

3 0
1 year ago
You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
galina1969 [7]
The answer is True bc it saves you time and is efficient
6 0
2 years ago
Other questions:
  • Which social networking function came first?
    9·2 answers
  • . What is automated testing?
    10·1 answer
  • 3. Which one of the following statements is correct? _____ variables are those whose storage bindings are created when their dec
    12·1 answer
  • Write an expression that executes the loop while the user enters a number greater than or equal to 0.
    10·1 answer
  • Recovery after a disaster involves installing the most recent ________ backup copy.
    15·1 answer
  • How would you copy all files from a remote directory into your LOCAL home folder.
    6·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • 100 points for this and brainlyist lol
    11·1 answer
  • Como se llaman las herramientas y maquinas pque utilizan para hacer cosas artesanales
    10·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!