1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
14

If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:

_______a. shared content with version management b. shared on Google drive c. shared content with no control d. shared with the public e. shared content with version control
Computers and Technology
1 answer:
gogolik [260]3 years ago
3 0

Answer:

d

Explanation:

Because a decimal number

You might be interested in
Use the code below to answer the following questions. Note that the catch statements in the code are not implemented, but you wi
anzhelika [568]

Answer:

d) either e1 or e5

Explanation:

Here, the instruction i1 goes ahead in trying to open the given file through an input stream buffer reader. If the given file name is wrong, it will indicate that an e1 file is not found or if any other IO errors due to invalid stream, no disc in drive e5 IO exception will be drawn.

4 0
4 years ago
7. Write a Qbasic program to read the value
Shtirlitz [24]

Answer:

PRINT "Values for Principal (P), Rate (A) and Time (T)"

INPUT P, A, T

I = P * A * T/100

Amount = P + I

PRINT "Interest: ", I

PRINT "Amount: ", Amount

Explanation:

This prompts the user for values for Principal, Rate and Time

PRINT "Values for Principal (P), Rate (A) and Time (T)"

This gets values for Principal (P), Rate (R) and Time (T)

INPUT P, A, T

This calculates the interest (I)

I = P * A * T/100

This calculates the amount (A)

Amount = P + I

This prints the interest (I)

PRINT "Interest: ", I

This prints the amount (A)

PRINT "Amount: ", Amount

4 0
3 years ago
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure
MakcuM [25]

Answer:

Update the unit firmware.

Explanation:

Updating unit firmware means update the information related to the network that is newly installed on the wireless router. The purpose of this change is to update the devices with new network alterations to work with efficiency and better security. As things are updating on daily basis, so the manufacturer makes the devices, reprogram able to meet the requirement of the future by updating the program in firmware unit. By updating device means this will be to fix the bugs that can be occur in modern era. This will make the device more secure.

5 0
3 years ago
A single instruction carried out by a computer is called a what?
pochemuha

Answer:

in computer science, an instruction is a single operation of a processor defined by the instruction set

Explanation:

if you need anymore help let me know :)

6 0
3 years ago
which type of encoding involves relating new information to existing knowledge that you already have stored in long-term memory?
rjkz [21]

A type of encoding that involves relating new information to existing knowledge that you already have stored in long-term memory is: Semantic encoding.

Encoding can be defined as a communication process in which the sender of a message transforms an information into an encrypted message, in the form of notable symbols that represent ideas or concepts.

Generally, a message that has been encoded by a sender requires a decoding action by the recipient, in order for the communication process to be complete.

Semantic encoding is a type of encoding which typically involves the relation of new information with respect to an existing knowledge that has been stored in long-term memory.

In conclusion, semantic encoding deals with the encoding of meaning from new information rather than perceptual characteristics such as the meaning of words in English language.

Read more: brainly.com/question/24113575

7 0
2 years ago
Other questions:
  • If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
    5·2 answers
  • In addition to training on the products and on company policy, it does not make sense to be prepared to speak about your company
    6·2 answers
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • 1. Perform the following Binary Additions 101101 + 10100 *
    13·2 answers
  • _____ is the software that protects you computer from harmful files, Trojan horses, and worms.
    13·2 answers
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • The jailbreak property that, if the user turns the device off and back on, the device will start up completely, and the kernel w
    15·1 answer
  • What is the most commen code used in games?
    13·1 answer
  • To gain a competitive edge this year, the upper management of a global IT company has decided to focus on customer service, empl
    13·1 answer
  • Josh needs to write a research report for his Civics class. Which file type will allow him to save his file? (5 points)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!