1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
2 years ago
8

Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.

Computers and Technology
2 answers:
Ne4ueva [31]2 years ago
7 0
The answers are a, b, and e.
Otrada [13]2 years ago
6 0

Answer:

b is the right answer. she posts messages that avoid slang and text language

You might be interested in
Given the plaintext {0F0E0D0C0B0A09080706050403020100} and the key {02020202020202020202020202020202}: a. Show the original cont
Fiesta28 [93]

Answer:

Check the explanation

Explanation:

We will be arranging the plaintext in a 4 * 4 matrix <u><em>(which is a rectangular shaped group of symbols, numbers, or expressions, that are arranged in columns and set rows For example, the dimension of the matrix we will be using to explain the above question is 4 × 4, because there are four rows and four columns.)</em></u> in the step by step explanation below.

5 0
3 years ago
If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
KATRIN_1 [288]
Most likely bring it to your managers attention and and have him contact an OSHA employee.
4 0
4 years ago
What feature is not included in most DTP programs?
IceJOKER [234]
Features included in most DTP programs would be kerning, master pages, and WYSIWYG. S video editing isn't included in most programs for DTP
5 0
4 years ago
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Other questions:
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • With only a floor plan to reference, the designer would know what about a window?
    7·1 answer
  • Where does the Total row of an aggregate function display its results? First row in Datasheet view Only row in Datasheet view La
    10·1 answer
  • When someone makes a bad or immoral decision because a group of their friends is also doing it, it is called:
    10·1 answer
  • A final class can't be extended.<br><br> *True<br><br> *False
    9·1 answer
  • Why is UPS necessary to connect with the computer​
    11·1 answer
  • Which of the following shows how to correctly declare pointer variable x?
    7·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!