1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natima [27]
2 years ago
8

A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.

Computers and Technology
1 answer:
german2 years ago
5 0

Answer:

I think Microsoft Teams

Explanation:

Microsoft Teams. Teams is a chat-based collaboration tool that provides global, remote, and dispersed teams with the ability to work together and share information via a common space. You can utilize cool features like document collaboration, one-on-one chat, team chat, and more. Microsoft Teams is also fully integrated with many other Office 365 services, such as Skype, SharePoint, Exchange, and Yammer.

You might be interested in
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Need help with a program to search to sort elements in an array.(increasing or decreasing order)
astraxan [27]

This is for Python

numbers = [7, 3, 6, 9, 0]

print(numbers.sort())

Output: [0, 3, 6, 7, 9]

numbers = [7, 3, 6, 9, 0]

print(numbers.sort(reverse = True))

Output: [9, 7, 6, 3, 0]

7 0
3 years ago
6. You and your friends take an awesome selfie, and you add your name and addresses to the picture. It is a good idea to share t
Trava [24]

Answer:

family and friends you trust

3 0
3 years ago
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
Sindrei [870]

Answer:

A) hacktivist

Explanation:

According to my research on cyber security attacks, I can say that based on the information provided within the question the form on online vandalism being defined is called hacktivist operations. These are activists who hack into government or organizational systems in order to protest their policies or actions, and by doing so can severely damage their systems.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Read 2 more answers
Other questions:
  • "Server Manager will allow you to manage all roles and features installed on any server, and view the status of all your servers
    7·1 answer
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • I need a idea of a origami for my coding class and it needs to be easy to make
    15·2 answers
  • Which action is LEAST important to maintaining a healthy credit score?
    8·2 answers
  • What is the color difference between the iMac and iMac Pro
    14·2 answers
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switc
    5·1 answer
  • Credence is a student in college.
    13·2 answers
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • Consider the following code segment.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!