1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
14

_________ are exchanges of messages about a particular topic using e-mail, professional blog space, and other electronic tools t

o encourage participation that will ideally lead to new ideas, strategic planning, and sound decision making.
Social Studies
1 answer:
MA_775_DIABLO [31]3 years ago
8 0

Answer:

The correct answer is : E-mail dialogues

Explanation:

When encouraging a team to actively participate in cooperative work this strategy is great.  You can give different points of view.  It permits users to maintain context in an electronic mail. This electronic-based environment explores how effective an e-mail is used as a writing tool.

You might be interested in
How do religious events of the past, impact the events of today?
klemol [59]

Answer:

it varies a lot from those days

6 0
3 years ago
When a person has claustrophobia, he or she may go to great lengths to dodge elevators and other enclosed spaces. Staying away f
Virty [35]

Answer:

Stress.

Explanation:

This person should seek help to eliminate anxiety and stress. I am unaware as of what you mean by this... Do you mean what else should they avoid such as other tight spaces or to eliminate things like stress.

6 0
3 years ago
If you have 8 package of salt.
xz_007 [3.2K]

Answer:

two(2) packet of salt are remaining

6 0
3 years ago
Read 2 more answers
Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a _
goldenfox [79]

A trojan horse are examples of malwares with a downloaded music or apps programs that seem authentic but perform an unwanted activity.

<h3>What is a trojan horse?</h3>

This refers to a class of malware that is often downloaded onto a computer while been disguised as a legitimate program.

Most time, the delivery method of this malware typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.

Hence, any example of a typical trojan horse are malwares with a downloaded music or apps programs that seem authentic but perform an unwanted activity.

Read more about trojan horse

brainly.com/question/10742940

#SPJ1

6 0
2 years ago
How do scientists use GPS?
natima [27]

When radio waves emitted by the starpass through the planet's atmosphere, they bend and change frequency, and thischange can be measured to determine the atmospheric composition. The GPS radio occultation(GPS-RO) technique works in a similar fashion.




5 0
3 years ago
Other questions:
  • People who favored the concept of nativism feared and opposed
    7·1 answer
  • Betty Freidan was a leading feminist<br> a. True<br> b. False
    8·1 answer
  • What are countermeasures? Are they technical in nature, or non-technical as well?
    5·1 answer
  • In modern times the Hoop Dance became a storytelling dance as a solo dancer creates shapes depicting animals of nature reflected
    6·1 answer
  • Whos more democratic america or the athens greece help
    12·1 answer
  • Lz help if u answer this right ill try to give brain
    12·1 answer
  • 1. Which is not a sign of good mental health?
    10·2 answers
  • Where is Sahara located in Africa
    14·1 answer
  • List of community helpers
    11·1 answer
  • How do i find out what keywords my competitors are using?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!