1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
13

In this unit, you learned about using the internet for business purposes. What forms of business communication rely on the inter

net? How do these forms differ from each other? What are some of the risks associated with internet-based communication? Which form do you think businesses find most useful for reaching the public? Why?
Business
1 answer:
jolli1 [7]3 years ago
5 0

Answer:The forms of business purpose is Email, instant messaging, websites, blogs, text messaging, voicemail and video messaging.Each form have there way of doing things like emailis a message.and video message is a massage but you can see who you are talking to.The Form that I think is useful is Email because everyone use it.

<u><em>ty</em></u>

You might be interested in
One of the likeliest places to be involved in a property-damage only accident is?
sesenic [268]

Place your car in "park."

Defend you against approaching traffic.

When a vehicle collision occurs, it might be stressful, but it's crucial to keep in mind that your safety is always the top priority. Immediately upon being involved in a collision, keep in mind the following advice:

Verify your own health and the health of any passengers.

If you require medical asisstance or can't move your car, call "911" and follow the operator's instructions.

You should relocate to a safe area (such as the closest shoulder, the median, or the rightmost lane of the road) before exiting your car to examine the situation if it is still operational and neither you nor any of your passengers have been hurt.

to know more about property damage

brainly.com/question/4539405

#SPJ4

7 0
1 year ago
Read 2 more answers
Extrinsic motivation is defined as ________. the pursuit of an activity for external reward the pursuit of an activity for its o
dexar [7]
Extrinsic motivation is defined as THE PURSUIT OF AN ACTIVITY FOR EXTERNAL REWARD. Extrinsic motivation refers to behaviours that are driven by external rewards such as money, fame, praise, etc. Such behaviours arise from outside the individuals. 
6 0
3 years ago
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpag
Mariana [72]

Answer:

This kind of malware attack is known as ransomware.

Explanation:

-Ransomware is a type of malicious software that typically involves encrypting the files of a victim's PC, laptop or systems. The hacker(s) This essentially denies the victim any access to their data.They then demands payment in order to allow the victim access to their own data. The payment is always required to be transferred in crypto-currency to the hackers.

-Examples of ransomware includes Reveton, CryptoLocker, CryptoWall and the infamous Wannacry which attacked many victims PC across the globe in 2017. Ransomware attacks can be initiated by a user unknowingly visits an infected website.The malware then self downloads and installs itself onto the user’s PC without their knowledge.

-Ransomware attacks can be prevented by using advanced antivirus.

7 0
3 years ago
A firm that is threatened by the potential entry of competitors into a market builds excess production capacity. this is an exam
Pavel [41]

A firm that is threatened by the potential entry of competitors into a market builds excess production capacity. this is an example of <u>a credible threat.</u>

<u></u>

A credible threat is one in which there is a real possibility that the member may soon do serious physical harm to other people (including death), and that possibility cannot be completely eliminated by changing any existing rules, norms, or practices.

A system holding State data or a product delivered by the Consultant that has an exploit that a person with knowledge of information technology security believes may be used to compromise one or more parts of the system constitutes a credible danger.

To learn more about Credible Threat here

brainly.com/question/20226868

#SPJ4

6 0
2 years ago
The three phases involved in the management of large projects are
Simora [160]
Operations management are multiple activities that create value for consumers by way of a good or service. The create the good or service and put them out in the market. 
When planning a managing a large product you need to make sure that the phases are follow throughly and accurately.
Phase 1) Planning
Phase 2) Scheduling
Phase 3) Controlling
8 0
3 years ago
Other questions:
  • Your broker called earlier today and offered you the opportunity to invest in a security. As a friend, she suggested that you co
    9·1 answer
  • *LOOK AT THE PHOTO PLEASE*<br> The goal of giving the debtor a fresh start is accomplished through
    6·1 answer
  • Determining if products made in-house will be produced in one or more facilities, and if these facilities should be located in o
    8·1 answer
  • Travis bought a share of stock for $31.50, the stock paid a dividend of $0.85, and Travis sold it six months later for $27.65. W
    9·1 answer
  • Charlotte was born to a lower class family in rural pennsylvania. after taking a job in the mail room of a large corporate offic
    7·1 answer
  • In evaluating how well a company's strategy is working, the best place to start is
    13·1 answer
  • ​_____________ is the largest single group in the U.S. business labor​ force, and this group dramatically benefits from informat
    7·1 answer
  • Marginal cost is equal to A. change in total variable cost divided by change in output. B. change in total cost divided by chang
    11·2 answers
  • Austin Company uses a job order cost accounting system. At the beginning of the year, the company's executives estimated that di
    7·1 answer
  • the program protection plan (PPP) is the milestone acquisition document that describes the plan, responsibilities, and decisions
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!