1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
10

What do the groups in professional networking sites allow you to do?

Computers and Technology
1 answer:
serg [7]3 years ago
5 0

is it that is focused solely on interactions and relationships of a business nature rather than including personal, nonbusiness interactions?

You might be interested in
Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known
Ipatiy [6.2K]
<span>Social engineering is when a person convinces someone to reveal personal information and security system. Those people who use social engineering can trick people through telephone interactions, face-to-face interactions, and email or web interactions. In telephone interaction, they act like a technician but attempts to gather information from the victim. The person who uses face-to-face interactions is when the victim is interrogated to get information. And in email or web interactions, these social social engineering technique will send survey forms that asks personal information such as bank account.</span>
3 0
3 years ago
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
inysia [295]
<span>b. Application software 

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:
Microsoft Office Word, Excel, Powerpoint</span>
8 0
3 years ago
you are the manager of a virtual team that is working on a project. You uploaded a Word document to an OneDrive account that you
Valentin [98]

He can simply right click on the file and select restore previous versions. Instead of the manager choosing to recreate the Word document from scratch, he can recover the initial and previous version of the file. Once he has clicked the “Restore previous versions” option, a list of available items will pop. He will click the version he would like restored and click “Restore”

6 0
3 years ago
An argument does not always have to be made in words. A piece of music
mixas84 [53]

Answer:

B. emotional

Explanation:

An emotional argument. An argument does not always have to be made in words.

4 0
3 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
3 years ago
Other questions:
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • During an experiment, if you purpose change the temperature to test a hypothesis the temperature is called what??
    6·1 answer
  • describe a real-world scenario where data is collected and needs to be both accurate and precise for the safety of the community
    9·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random in
    6·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
  • A while loop is frequently used to ______________ data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!