1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
2 years ago
13

What does the word collaborative mean?

Computers and Technology
2 answers:
tia_tia [17]2 years ago
7 0

Answer:

your answer is letter A.working together to complete a project or a task

Crank2 years ago
3 0

Answer:

A

Explanation:

working together to complete a project or a task

You might be interested in
A common hardware component found in electronic devices including desktop computers, laptops, tablets and smartphones. The amoun
Maurinko [17]

Answer:

A. RAM

Explanation:

RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

8 0
2 years ago
When internet techonology was developed in the 1970s by the department of defense?
Scorpion4ik [409]
TRUE. The internet began as a military infrastructure project for communication purposes.  
3 0
2 years ago
What can be designed to create annoying glitches or destroy data
Katen [24]

I guess the best answer is Virus.

Virus is a malicious computer program that is designed to create annoying glitches or destroy data.

3 0
2 years ago
Read 2 more answers
Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further obser
atroni [7]

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

6 0
2 years ago
Melissa needs to put a topic name on her email that she will send will to her teacher . choose the name of the field
Lera25 [3.4K]

It is A. I am pretty sure

8 0
3 years ago
Read 2 more answers
Other questions:
  • Use cases can be used to document both the current (As-Is) system and the future (To-Be) system. A. True B. False
    13·1 answer
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • One type of technology that can verify a person's identity is _____.
    6·2 answers
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • In a @return tag statement the description:
    13·2 answers
  • A sense of scale tells us what about the objects in a picture?
    11·2 answers
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum
    11·1 answer
  • 10. List three adaptations of wind-pollinated plants to promote pollination.<br>​
    12·1 answer
  • How do i know my child's login info for parent infinite campus
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!