name any two software programs that employees can use to communicate effectively ​

Answers

Answer 1

Answer

unified communication software or video conference.

Explanation:


Related Questions

in a formal business document, a works cited list usually appears___.

Answers

Answer:

At the end

Explanation:

In formal documents, each of the cited works is written in different paragraphs and assigned a number at the end of citation in ascending order.

Finally, at the end of the document, the document reference where it has been published online in same order as in document is quoted. Finally, this list of cited works appears at the end of the document called references and Bibliography.

Given that n refers to a positive int use a while loop to compute the sum of the cubes of the first n counting numbers, and associate this value with total. Use no variables other than n, k, and total.

Answers

Answer:

first, we have to make value for n.

n = 10

now, use the while loop to cube the numbers.

while n = 10 and k = 4:

k = n ^ 3

lastly, make a total.

total = k

the total should be 10 cubed, given the value.

I hope this helps!

list any four features of second generation of computer on point​

Answers

Answer:

Given below:

They used transistor as main component.Their are operating speed was up to microsecond.They used magnetic core memory as internal storage.They could understand assembly and high level language.

You have just finished installing a network adapter and booted up the system, installing the drivers. You open File Explorer on a remote computer and don't see the computer on which you installed the new NIC. What is the first thing you check

Answers

Answer:

to make sure everything is plugged in and turned on

Explanation:

I do this every day at work, there's always one wire that got missed

please help our cause by spreading this flag all over brainly

what are the pieces of information that describe the appearance of a cells content

Answers

Answer:

Information about the parts of a cell, its location and role will help describe the appearance of a cell's content.

Organelles are cell structures that include the nucleus, cytoplasm, cell membrane among others. One can view these using a light microscope.

1. Cell Membrane is a fluid mosaic. It is the outer boundary of the cell.

2.Cytoplasm is the fluid inside the cell. It is located between the nucleus and the cell membrane.

3.Nucleus is the control center of the cell and is located at the center.

The ________ function accepts two or more logical tests and displays TRUE if all conditions are true or FALSE if any one of the conditions is false. (5 points) NOT NOR AND OR

Answers

Answer:

brianary system function

Alberto works in internet marketing and receives over 300 emails a day that he must respond to. Unfortunately, the new office that Alberto moved into temporarily has very limited internet connectivity. What protocol would help Alberto with this situation and allow him to read and respond to his messages offline?

Internet Control Message Protocol (ICMP)


Post Office Protocol (POP3)


Dynamic Host Configuration Protocol (DHCP)


Interactive Mail Access Protocol (IMAP)

Answers

Answer:

B.) Post Office Protocol (POP3)

Explanation:

Post Office Protocol (POP3) is an Internet standard protocol for extracting and getting email from a remote mail server for usage by the host machine. It is an application layer protocol that lets users retrieve and send email, according to the OSI model. I hope this helps! ^-^

Cam's computer has been crashing lately. He's on a deadline and has been losing important work when he saves it to his laptop. Where should cam save his data?

Answers

Answer:

Save it to the server, then click Done.

Please click the heart, it shows appreciation.

Should spreadsheets be used to write a letter?
YES
NO

Answers

When we are talking about a letter, I am assuming something like an email. A spreadsheet is only good for data collection, writing letters is not a data collection and thus a spreadsheet's use is negated.

Hope that helps!

True or false: Quality score is an algorithm that scores each of your search ads on spelling and grammar.

Answers

True or false: Quality score is an algorithm that scores each of your search ads on spelling and grammar.

Answer: False

I think sorry

The given statement is false.

What is  Quality score?

Quality Score exists as a diagnostic tool meant to provide you a sense of how well your ad quality analogizes to other advertisers. This score exists calculated on a scale from 1-10 and is obtainable at the keyword level.

To define the position of the ad on a search engine, each ad exists allocated using a procedure that takes into account the bid and the Quality Score.

Quality Score exists rating of the quality and relevance of both your keywords and PPC ads. It is used to choose your cost per click (CPC) and multiplied by your maximum bid to choose your ad rank in the ad auction process.

Hence, The given statement is false.

To learn more about Quality Score refer to:

https://brainly.com/question/8034313

#SPJ2

I am the biggest and most important part of data storage hardware. I am about the size of a small book and store critical things like the OS, software titles, and other files. What am I

Answers

Answer:

HDD (Hard drive disk) or SSD (Solid state drive)

Explanation:

Why is a second ALU needed in the Execute stage of the pipeline for a 5-stage pipeline implementation of LC-2200

Answers

Answer:

Those stages are, Fetch, Decode, Execute, Memory, and Write. The simplicity of operations performed allows every instruction to be completed in one processor cycle.

A tropical storm has been moving at 15 miles

Answers

where’s the rest of the question?

A(n) ________ is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Question content area bottom Part 1 A. firewall B. electronic sensor C. burglar alarm D. fireproof vault

Answers

Answer:

A. firewall

Firewalls filter the traffic in and out of a network and block devices that were set not to be allowed in.

A firewall is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Thus, the correct option for this question is A.

What do you mean by Local network?

A Local network may be characterized as a sequence of computers that are significantly linked together in order to form a network in a circumscribed location. The computers within a local network connect to each other via TCP/IP ethernet or Wi-Fi.

The Firewall riddles all the members of the local network with respect to nonmembers. It works on all sorts of traffic that are found inside and outside of a network. It also blocks the devices of local members that were commanded not to be allowed in.

Therefore, a firewall is a device that enables members of a local network to access the network while keeping nonmembers out of the network. Thus, the correct option for this question is A.

To learn more about Firewalls, refer to the link:

https://brainly.com/question/13693641

#SPJ5

Aerodynamic _____ occurs when an object moving through the air is slowed down by the air resisting the object's forward movement. (4 letters)

Answers

Answer:

air resistance

Explanation:

Aerodynamic Drag occurs when an object moving through the air is slowed down by the air resisting the object's forward movement.

Aerodynamic drag, often simply referred to as "drag," is a force that opposes the motion of an object as it moves through a fluid medium, typically air.

When an object moves through the air, it has to push the air out of the way, and in turn, the air exerts a resistance force on the object. This resistance force is call drag.

Drag is a significant factor in various contexts, such as aviation, automotive engineering, and sports. It's responsible for slowing down vehicles, affecting their fuel efficiency, and influencing the design of objects to minimize its effects.

Learn more about Drag here:

https://brainly.com/question/13512865

#SPJ3

write a program that will ask the user to input a number beween 50-60​

Answers

Answer:

def main():

   askUser = int(input("Choose a number between 50-60"))

if askUser >= 50:

    if askUser <= 60:

     print("You've chosen the number " + str(int(askUser)) + "!")

else:

    print("Error, please enter a number between 50-60!")

 

main()  

Explanation:

The program asks the user to pick a number between 50-60. If they enter anything else, an error message will pop up redirecting them to choose a number only from 50-60.

How many pixels are in a picture that is 640 pixels wide and 480 pixels high?.

Answers

Answer:

307200 pixels

Explanation:

Multiply the dimensions:

640 x 480 = 307200

a specific type of data stored for a record
options:
A. Table
B. Field
c. Cell

Answers

Answer:

Table

Explanation:

A set of data is stored in a table.

What hand-held gaming system did Nintendo release in 1989?
Game Boy
Game Cube
Nintendo DS
Nintendo Wii

Answers

Answer:

Game Boy!

Explanation:

Game Boy was a very popular gaming system used by children around the world (especially US and Japan). It marked the childhoods of many.

:)

Answer:

Game Boy

Explanation:

The first handheld game console with interchangeable cartridges is the Milton Bradley Microvariation 1979. Nintendo is credited with popularizing the handheld console concept with the release of the Game Boy in 1989 and continues to dominate the handheld console market.

I personally wasn't alive during the release of the Game Boy, but I have many Game Boy systems today. :)

Gina manages four sets of databases for the University; one with student name and address information, and one with student billing information, one with academic records for all students and one for current student enrollment status for the semester. She has been asked to use one common field to link the databases. What BEST identifies this particular type of field name?

Answers

Answer: In short words, be awesome like the star you truly are.

-this is why with Potato

Explanation: - learn with brainly

A software development _____________ provides a framework for designing, writing, and testing software.

Answers

I think methodology

When is it appropriate to have your security badge visible.

Answers

The security credential is a way to identify yourself as a member of a security institution.

What is a security credential?

A security credential is a personal document that includes various personal data that accredits an individual as a member of a specialized security group.

When is it appropriate to have the security credential visible?

A security credential is appropriate to have visible when interacting with other people to give them the necessary instructions related to the security of a place.

Learn more about security badge in: https://brainly.com/question/4180037

Which query wizard allows the user to choose the field that will be calculated for each row and column intersection

Answers

Answer:

ur mom

Explanation:

sorry on a times exam and I need answers

What evolution has cryptography grown since sample passwords? Name 5.

Answers

Answer:

Encrypting Company Devices. ...

Securing Email Communications. ...

Protecting Sensitive Company Data. ...

Encrypting Databases. ...

Securing a Website.

Explanation:

Which attack intercepts communications between a web browser and the underlying os?.

Answers

Answer:

A man-in-the-middle attack.

The attacker is not actually on the network, but instead pretends to be a trusted resource (usually an Internet connection) by intercepting all traffic going to or from that server or service. This means they can read or modify the traffic before it reaches its destination. For example, if a website you are visiting sends your password to another site in cleartext, a man-in-the-middle could intercept this packet and read your password.

Explanation:

My own original answer.

find answer.
74 68 69 73 20 69 73 20 77 72 69 74 74 65 6E 20 69 6E 20 68 65 78 20 62 75 74 20 69 74 73 20 6E 6F 74 20 68 61 72 64 20 74 6F 20 66 69 6E 64 20 6F 75 74 20 74 68 61 74

Answers

Answer:

"this is written in hex but its not hard to find out that"

Explanation:

Each two hexadecimal digits represent an ASCII character. I.e.,

74 = t

68 = h

69 = i

73 = s

and so forth...

Look up any ASCII table on the internet that uses hexadecimal numbering, and you can translate by yourself. I attached one below.

Which of the following is a way to move to different exhibits throughout the museum? (1 point)
the plus and minus icons
the blue arrows
the camera icons
the eye icon

Answers

Answer:

The answer is B the blue arrows.

Explanation:

Answer:

b the blue arrows

Explanation:

Does anyone know how to fix this?

Answers

Answer:

Turn it on

Explanation:

Im stuck on thiss for the longesttt

Answers

Answer:

i cant understand?,

Explanation:

i know its a sort of coding game but what is the goal of the game/task?

A ______ is a set of step-by-step instructions to complete a task so that users can be sure to complete the task correctly.

Answers

Answer:

Algorithm

Explanation:

An algorithm a process or set of instructions that is created to solve a problem.

Other Questions
a major regulator of bone growth ?a.pthb.calcitoninc.growth hormonee.active vitamin D Argue the importance of planning for higher education as an important step in one's life What is the molarity of a solution prepared by dissolving 8 grams of BaCl2 in enough water to make a 450. 0 mL solution? (Hint: must convert grams to moles first). pls helpppYou have 2 bags, bag 1 had 5 green marbles, 6 red marbles, 7 pink marbles and 3 yellow marbles. bag 2 had 6 green marbles 2 red marbles 3 pink marbles and 8 yellow marbles if you pull one from each what is the probability of getting a pink marble from each bag? 2 In which lines that's the poet used a metaphororyour mighLast Line3 In what way can war'constrict the heart?4 What do you learn about the horses?5 What might a giant's palm' refer to?6 What is the inevitable fate that awaits the sole -6 Sarah is selling water bottles at a football game for $2.25 each . She spent $36.75 to purchase the water bottles, ice, and cooler. If she wants to make at least $180 after expenses, what is the fewest number of water bottles she must sell? D. 117 97 B. 80 A. 64 Please help I to know how to solve it but I know The answer is 97B. If the energy of a photon is [tex]3.34[/tex][tex]10^{-20}[/tex] J, what is the wavelength of that light? How does chemotherapy affect normal cells and cancer cells. i really need help on this question The term ___________ means using language that adapts to the needs, interests, knowledge, and attitudes of the audience.A. emphasisB. sincerityC. fluencyD. directness What is the x-intercept of x^2-4x How do you solve 162x0. 967 using standard algorithm? The quotient of 25 and 5 increased by3 What do plants do when they grow towards sunlight?get more lightdie fasterlive longerget smallerHelp ASAP What is it that I do with my life that will help me be better person HCF of 99, 33, 121 using common division method Question 3Sometimes when people first hear about the Traveling Salesman problem, they think: "Oh, that's not hard. Start with a city on the map; move to the nearest unvisited city; and then on each subsequent step, move to the nearest still-unvisited city, until you're done." This strategy is called a "greedy strategy": it always goes to the nearest allowed step.Now consider four cities, all placed along the number line. City A is at point 0, City B at point 2, City C at point 3, and City D at point 10: A B C D00-01-02-03-04-05-06-07-08-09-10 Now, start a traveling salesman tour at City B, and use the greedy algorithm to choose your tour of the four cities, beginning and ending at B. How long is the greedy algorithms tour? Wolves and dogs are closely related. Most scientists believe that dogs ancestors were wolves. Through time, wolves became tame enough to live with humans and help them. The change from wolf to dog was probably a result of careful breeding. Early humans allowed only the friendliest wolf pups to remain near them. This ensured that, over time, the wolves that stayed with groups of humans became tamer and tamer.Wolves were influenced by their relationship with humans. So, they slowly became what we know today as dogs. They became adept at protecting and herding sheep and other animals whereas their ancestors would have made a meal of them. This ability made dogs very useful. However, although they are quite similar, wolves and dogs are also quite different.Wolves are wild animals that live in packs, or groups, and eat only meat. They find their food by hunting. The most common noise they make is a howl. They may also bark, growl, yelp, and whine. All wolves look very much alike, although their colors vary slightly. They are large, slender, powerful animals with long legs and tails. Wolves are quite wary of people; they dont trust them. They attack people only on rare occasions, usually when they are startled.A small dog is looking up at a large wolf.Dogs, on the other hand, are tame. They have been influenced by people for many, many years, which has made them quite different from wolves. For one thing, dogs eat vegetables and grains as well as meat products. They are much more likely to bark than to howl. Their sizes range from gigantic animals that are much larger than wolves to tiny animals that can sit comfortably in a cereal bowl. Large dogs are not only taller than wolves, but they are much heavier, and their appearances can vary as much as their sizes.However, the main difference is found in dogs relationship with humans, whom they usually prefer to be near. The main effect of this is that most dogs are friendly to people. Some show hostility, but almost always only to strangers. Although most dogs are no smarter than wolves, they can certainly be trained more easily. They rarely hunt prey to eat and depend on their owners to supply them with food. This reliance on people just adds to the closeness of the relationship.Wolves and dogs both pant to stay cool. They both can hear and smell very well, and they both can run silently. They even have the same number of teeth: 42. However, no matter how similar wolves and dogs may seem to be, wolves can never be made into a pet. They are also worthless as guard animals because they are shy. Domestic animals, such as cats and small dogs, are in more danger from wolves than humans are, but small children can also be in danger. The Big Bad Wolf may exist only in fairy tales, but real wolves can be as much of a threat, especially if they are not understood.This question has two parts. First, answer part A. Then, answer part B.Part AHow does the author organize the text? A. by describing how wolves find ways to survive B. by comparing and contrasting wolves and dogs C. by listing the ways dogs have changed through time D. by telling about the habitats of both wolves and dogsPart BWhich detail shows how the text is organized? A. Early humans allowed only the friendliest wolf pups to remain near them. B. Large dogs are not only taller than wolves, but they are much heavier, . . . C. This reliance on people just adds to the closeness of the relationship. D. The Big Bad Wolf may exist only in fairy tales, . . .1 / 80 of 8 Answered Explain step by step how you use the horizontal method to multiply the two polynomials 2a? - 3a +5 and 3a? + 4a - 4I will give brainlist plsss answer fast