1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
6

Which of the following electronic collaboration techniques is the best

Computers and Technology
2 answers:
muminat3 years ago
6 0

Answer:

D. project management software

guapka [62]3 years ago
4 0

Answer:

Video conferencing

Explanation:

Email:-

Email is a good source to conduct .But it depends on the receiver to give feedback As fast as possible.

Collaborate Workspaces:-

Collaborate workspaces are good enough but it depends on Users to be online.

Project management software:-

Same as collaborative workspaces.

<h3>Video conferencing is best</h3>
You might be interested in
Select the correct answer.
Roman55 [17]

Answer:

The answer is procedures I looked it up for ya :)

Explanation:

6 0
3 years ago
Read 2 more answers
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
Which feature does the web designer fail to apply in this layout for a web page? A. harmony
iogann1982 [59]
The answer is D.balance
3 0
3 years ago
Read 2 more answers
A personal computer can only have one operating system installed on it. true false
Pani-rosa [81]
It is true, because if you would try installing another OS after installing the first one, you would overwrite the OS which you installed before.
but in the second opinion an workstation is technically able to dual boot by installing differend operating systems on different drives. which approves that both answers can be right.
8 0
3 years ago
Which toolbar is used to change the appearance of text in a presentation?
zmey [24]

Most of them are but id say

the bold, italic and underline are most popular

7 0
3 years ago
Read 2 more answers
Other questions:
  • What types of storage can be used to access your data on another computer?
    6·2 answers
  • A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 950
    8·2 answers
  • The primary function of the average command is what?
    15·1 answer
  • Why dose this keep popping up i dont understand plz resond first person gets branilest
    13·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • Which of the following statements are true about the code shown below in the class named Quiz? (Select all that apply.)
    7·1 answer
  • 1. Assuming you are downloading a 100MB (800Mb) file on a Network that can download data at 54Mbps.
    15·1 answer
  • You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a descripti
    15·1 answer
  • List four types of Web browsers<br>​
    5·2 answers
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!