1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
9

Which of the following is a productivity strategy for collaboration?

Computers and Technology
1 answer:
AfilCa [17]3 years ago
8 0

Answer:

Where are the answer choices? Can you put them down so I can answer them?

Explanation:

You might be interested in
HELPPP PLEASE <br><br> Html can be used to create complicated mobile applications <br> True or false
Hatshy [7]
It might be true because it’s technically a programming language so having knowledge on it can help you create mobile applications
7 0
3 years ago
5. Which one of the following statements is true for spell checkers? A. Most spell checkers flag inappropriate word usage. B. A
Strike441 [17]
It is b, as some word checkes don't recognize modern slangs. 
3 0
3 years ago
If you wanted to search for emails containing the word advanced and prevent emails containing the word new from appearing in the
chubhunter [2.5K]

Answer: Should be NOT.

Explanation: NAND would make you get emails as long as they don't have both "new" and "advanced." NOR would make you only get emails that don't have "advanced" or "new.| AND would make you only get emails with both "new" and "advanced." XOR would make you get emails as it has either "new" or "advanced," but not if it has neither or both. So NOT new makes sense, because it'll return emails that don't have "new." Hope this helps.

7 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Create a file using any word processing program or text editor. Write an application that displays the files, name, containing f
MArishka [77]

Answer:

below is a Shell I have ;

1.Import java.nio.file.*;

2.Import java.nio.file attribute.*;

3.Import java.10 Exception;

4.public class FileStatistics

5.{

6.public static void main(string []args)

7.{

8.path file=

9.

paths.get("C:\\Java\\chapter.13\\TestData.txt")

10.try

11.{

12.\\declare count and then display path, file, name and folder name.

13.

14.

15.

16.\\declare a BasicFileAttributes object, then add statements to display the file's size and creation time.

17.

18.}

19.

20.catch (10 Exception e)

21.{

22.\\add display 10 Exception

23.

24.}

25.}

4 0
2 years ago
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • What item on a business card is generally the most prominent?
    13·2 answers
  • If you place a semicolon after the test expression in a while loop, it is assumed to be a(n) ________. a. pre-test loop b. post-
    9·1 answer
  • If you want to write some fancy interface on your computer with expanded communication to the Arduino, what library should you u
    13·1 answer
  • Can you combine a wireless and wired lan in the same home
    14·1 answer
  • Explain word processing ​
    11·2 answers
  • Question 4 of 20
    5·1 answer
  • Project: big research project
    15·2 answers
  • Assignment 3: chabot<br>​
    13·1 answer
  • A ____ is an Access feature that makes it easy to enter data.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!