What is the act of working with someone to produce or create something?

A. Collaboration
B. Decision-making
C. Non-verbal communication
D. Problem solving

Answers

Answer 1

Answer:

A

Explanation:

Answer 2

Answer: A

Explanation:


Related Questions

My study background is business. I am doing a bachelor of business administration. My major course is management information of the system. But I want to do data science. I know the journey is typically hard for me. In future , it will be demandable if I do data science in master's . Have I made a good decision?

Answers

Answer:

Yes,I think your going on right path! Keep up the hard work ! You got this!

pls answer fast in five mins​

Answers

The answer is true!! I hope this helps!!

Complete the sentence. refers to the increasing accessibility of technology, allowing more people to access information, create content, and develop applications,​

Answers

Answer:

I'm pretty sure your answer is  democratization of technology

Explanation:

The democratization of technology refers to the process by which access to technology rapidly continues to become more accessible to more people.

Answer:

democratization of technology: the increasing accessibility of technology, allowing more people to access and create content and applications

Explanation:

edge 2022

it is used to replace numeric number of a website​

Answers

greatflombles or gr8flombles or go2flombles

Which of the following is not an operating system
A.LINUX
B.MAC OS
C.NEXUS
D.WINDOWS

Answers

Answer:

C

Explanation:

I hope this helped.

Answer:

I honestly don’t know... But I’m still gettin that credit Broski

Explanation:

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

Which inventor developed a method through which groups of people, instead of just
individuals, could view films at the same time?
Al Jolson
Robert Paul
Edwin S. Porter
Thomas Edison

Answers

Answer:

Thomas Edition is the inventor developed a method through which groups of people instead of just individuals,could view films at the same time.

Hope it will help you

Answer:

B: Robert Paul

Explanation:

edg2021

It is not Thomas Edison. He created the Kinetoscope that allows for individuals to watch, "The British inventor, Robert William Paul, expanded on Edison’s Kinetoscope parlors with his film projector, enabling theaters to display movies for groups instead of individual viewing"

Name two ways creating and managing a schedule in a spreadsheet help you reach your goals?

Answers

By keeping track of your work
Keeping you calm and not overwhelming you with unknown work

Creating and managing a schedule, one can:

It will help you to know the numbers of days you need to schedule for.Help you to Assign employees or people to their shifts.

How does spreadsheet  management help you achieve your goals?

The at of managing your spreadsheet  wisely is one that entails having a good and careful planning of everything you want to do.

Note that by creating and managing a schedule in a spreadsheet, it can help you reach your goals as It will help you to know the numbers of days you need to schedule for.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ2

html use for web page deaign true or false​

Answers

PLEASE GIVE BRAINLIST

False

HOPE THIS HELPED


Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols group?

Answers

Answer:"TM"

Explanation:

Answer:

TM

Explanation:

because its used to identify, trademarks and etc. mark brainliest! i also got 100 on the quiz

PLZZ HELP!! ITS FOR A TEST!! Third generation computers were set apart because of this invention. A) microprocessors B) transistors C) integrated circuits D) vacuum tubes

Answers

Answer:

A. Invention of microprocessor

Explanation:

The third generation of computer itself was based on the technology of integrated circuits (shorten as IC).

It lasted for about 6 years and was brought to an end with the advent of the fourth generation of computers which was based on microprocessors.

Hence, option A answers the question.

Answer: I'm pretty sure the answer is C. Integrated Circuits.

Explanation: "The computers of the third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry. The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient." ( Tutorialspointwww.tutorialspoint.com)

Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops

Answers

Answer:

B. Clutter

Explanation:

I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.

What products can be benefited from cyber security?

Answers

Computers. It protects the system from viruses worms and spyware

what is the full form of flops​

Answers

Answer:

Floating Point Operations Per Second (FLOPS)

Explanation:

Floating Point Operations Per Second (FLOPS) is a measure of a computer’s performance, especially in fields of scientific calculations that make heavy use of floating-point calculations. Floating-point operations include any operations that involve fractional numbers.

Answer:

Floating Point Operations Per Second

How do you clean and maintain a mouse, keyboard, optical drive, computer display, and printers?

Answers

Answer: Mouse: to clean a traditional Mouse twist the plate that holds the ball and remove the ball then use a damp cloth to wipe the ball played and the surfaces and edges of the mouse to clean it Optical Mouse use the damp cloth to wipe the upper and lower surface of the mouse the lands area and ages of the mouse.

Keyboard: first shake the keyboard after turning it upside down to remove the does that might have accumulated in the slots and Cavities use a compressed air spray to blow away the contaminant between the keys of a keyboard. In addition spray with disaffected and wipe the keyboard throughly to remove all germs.

Optical drives: after a long. Of use the laser on an optical drive gathers dust and dirt therefore uses lens cleaner disc to remove contaminants from the laser in addition remove the optical drive in clean the tray with a damp cloth finally use a dry cloth to dry the tray before placing it back in the drive.

Computer display: to clean an LCD monitor use soft dip cotton cloth to gently wipe the screen if the computer display has a CRT screen dampen a cloth with the glass cleaner and gently wipe away the dirt from the screen.

Printers: use a damp cotton cloth to clean the inner and outer surfaces of the printer if there are cleaning Buns on the printer used in forehead cleaning and Cat cartridge cleaning in case he's cleaning buttons are not present when the computer contact the printer vendor for accurate directions to clean it.

Explanation: Here are some of the procedures that I would used to keep the peripheral devices clean.

Which of these jobs would be most appropriate for someone who majors in information systems?

Answers

Answer:

An Architect, System Designers, IT business analysts etc...

Explanation:

Answer:An Architect and System Designers someone who studies complex work

Explanation:

A _____ describes two or more computers connected to each other.

computer network

client

server

switch

Answers

Answer:

C

Explanation:

computer network

how do you get people to add you?

Answers

Answer:

go to their profile and click the person icon and done

Explanation:

Hope fixes her mistake and comes up with this list. A 2 column table with 5 rows. Column 1 is labeled Gas with entries Argon, Carbon dioxide, Nitrogen, Oxygen, Other gases. Column 2 is labeled Percentage with entries .93, .04, 78, 21, .03. She thinks it is a good idea to list the gases based on the amount of the gas found in the atmosphere from largest to smallest percentage. Which options would she need to apply to do this? Check all that apply. Use the Text option. Use the Paragraph option. Use the Header Row option. Use the Descending option. Use the Percentage Field option.

Answers

It's the last 3. I'm too tired to say anything else so here's a photo.

Question 1 (1 point)
Which word means "many different kinds?"
a
b
variety
vertigo
extraordinary
с
d
vast

Answers

Answer:

Variety is many different kinds.

Variety is the answer. It means different kinds

how many 16ths are in 3/8 of an inch

Answers

Answer:

0.375

Explanation: i think

What are some cowboy ethics??

Answers

Answer:

giv meh a min plsssss

Explanation:

New technology is driven by new discoveries in the _________ field.
Group of answer choices

finance

geology

mathematics

science

Answers

Answer:

science.......... ..

If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
to use?
'vegetarian restaurants
"restaurants
"vegetarians"
all of these

Answers

Answer:

A.

Explanation:

just did it

you really need to ask brainly for this question? obviously its vegetarian restaurants

Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would be most approperiate in his senario

Answers

Answer:

C.  email

Explanation:

The Email should be termed as electronic mail which is to be used to convey a message in an instant seconds

It is to be expressed in a formal way of communicating any message, notice, The important thing, etc

It is a quick, easy to use and most convenient way to send a message

Here in the given situation, since John wants to convey the best wishes for a meeting that scheduled later so here the email is the best and appropriate way to communicated as it is business documented also

What does "Forward" in emails do?​

Answers

Basically just want to make your your email is easy

16.
A cone has a volume of 4950 cm². If its vertical height is 21 cm, find its base radius.

take PI = 22/7

Answers

Answer:

r = 15 cm

Explanation:

formula

V = πr²×h/3

replace

4950 = 22/7×r²×21/3

4950 = 22/7×r²×7

4950 = 22×r²

r² = 4950/22

r² = 225

r = √225

r = √15²

r = 15 cm

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about the use of cyberterrorists?

Answers

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
100,000
1 billion
1 million
1000

Answers

Answer:

The correct answer is D) 1 Million

Explanation:

It has been predicted that in about five years the Information Technology sector in the United States will have about 1 million unfilled roles in computer science.

Cheers!

What is a domain?

A) The scalability of a network cable
B) An individual computer or other physical device
C) A server on a circuit board a network organization that uses at least one computer as a server
D) A utility that provides names to each computer on a network

Answers

Answer:

D

Explanation:

In general, a domain name identifies a network domain, or it represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet.

Other Questions
Leigh has collected data and performed statisticaltests for analysis. Describe the conclusions she candraw about the data based on her analysis. The Shinkansen (bullet train in Japan) makes a trip from Tokyo Station to Kyoto station in 2 hours and 14 min. The distance traveled is 460 km (to two significant figures). Determine the average velocity of the train in meters per second (m/s). [conversions: 1 km = 1000 m, 1 hr = 60 min, 1 min = 60 s] * What is 128,073 to the nearest thousand A rectangular table is two times as long as it is wide. If the area is 50 ft2, find the length and the width of the table. n + m-a=d solve for mHELP!! Describe and correct the error a student made when starting to solve the equation 8 ^ (x + 3) = 2 ^ (2x - 5) 8 ^ (x + 3) = 2 ^ (2x - 5) (2 ^ 3) ^ (x + 3) = 2 ^ (2x - 5) 2 ^ (3x + 3) = 2 ^ (2x - 5) Choose the correct answer below A. The student should have divided both sides by 2 ^ 2 to simplify the expression B. The student did not convert 8 to the correct power of 2 C. The student did not distribute 3 in * (2 ^ 3) ^ (x + 3) x + 3 D.The student should have expressed the initial rational exponent as the sum of two rational exponents .. Please I need help asap.. Express the area of the entire rectangle. Your answer should be a polynomial in standard form. When does the VB.NET programming environment start to operate? A. once a VB.NET project is compiled B. once a VB.NET project is created in the Microsoft Visual Studio environment C. once a VB.NET project is debugged D. once a VB.NET project folder is opened E. All of the above are correct A water bird is flying 11 feet above the surface of a pond.It dives 15 feet down and then rises 3 feet to catch a fish.What is the new position of the bird relative to thesurface of the water? Matthew and his 3 siblings are wedding a flower bed with an area of 9 square yards. If they shared the job equally,how much square yards of the flower bed will each child need to weed Help! Answer in box is wrong Use the text of the opinion piece, "What's for Lunch," and your completed graphic organizer to answer the question below. Include evidence from the article to support your answer. Do you think this author has an agenda? If so, what is it? If not, what is the purpose of her article? Does she achieve her purpose? HERE IS THE WHATS FOR LUNCH ARTICLEWhats for Lunch?Marcia Amidon LustedZachary Maxwell was tired of trying to explain to his parents why he wanted to bring lunch to school instead of eating hot lunch. They couldnt understand why he didnt want to eat the gourmet food described on the schools online menu, which sounded both nutritious and interesting. Zachary just couldnt convince them that the food wasnt as great as it sounded. So in the fall of 2011, he began sneaking a small video camera into the cafeteria at his school, to show his parents what the lunches were really like. Six months and 75 school lunches later, Zachary made a documentary film about his lunch called Yuck: A 4th Graders Short Documentary About School Lunch.Truth in Advertising?"The citys Department of Education says that its committed to providing delicious and nutritious meals through their food service program. But the lunch being served at my school was nothing like what they were advertising on their web site," Zachary, now 11, says in the documentarys trailer. "I told [my parents] thats not what they were actually serving me," he said. "But I dont think they believed me." For example, an "oven-baked pizza bagel with tricolor salad" was really nothing more than a slice of pizza and a wisp of lettuce. Sometimes there was no connection between the menu and what Zachary actually got. "Cheesy lasagna rolls with tomato basil sauce, roasted spinach with garlic and herbs" was, in reality, just a plastic-wrapped grilled cheese sandwich, all alone on a foam plate."When I came back home and showed them the footage, they were like, ugh!" Zachary said. His dad, an amateur filmmaker, started helping Zachary transform his video footage into a film. It won several awards, and Zachary also made appearances on television shows like Good Morning America.Not Perfect, But BetterLets face it: many times school lunches just arent going to taste as good as they sound. Students also complain that with lunches that follow the new school lunch guidelines, there just isnt enough food. Smaller portions, more fruits and veggies, and fewer calories leave some kids, especially teenagers, still hungry after eating their lunch. A group of students in Kansas even wrote a music video called "We Are Hungry," where they sing about their stomachs growling after lunch and how theyre collapsing on the sports field because they havent eaten enough.However, the new federal lunch guidelines do mandate meals that are better for students, with less sodium, more whole grains, fewer calories, and more fruits and vegetables, as well as skim or 1 percent milk. These are a definite improvement over school lunches of not that many years ago, which once stuck with fare like burgers, French fries, and chicken nuggets. Some schools even allowed fast food outlets like McDonalds and Pizza Hut to operate mini-restaurants in their cafeterias, or supply their products for students. Many schools have also reconsidered vending machines filled with sugary sodas, candy, and chips, replacing them with water and healthy snacks.The Lunch ForecastThe new school lunches are designed to help students eat better, and combat health problems like obesity in kids. Ideally, a healthy school lunch should also taste good ... or at least as good as the description on the menu. It should also keep students from taking a trip to the vending machine or a nearby convenience store as soon as lunch is over, because theyre still hungry. But will the lunches served in your cafeteria ever taste as good as a fast food burger or a gourmet meal cooked at home? You be the judge. How did archaeologists and historians learn to read Egyptian hieroglyphs? A. by excavating papyrus B. by deciphering Egyptian scrolls C. by translating the Rosetta Stone by studying with scribes Middle English was an integration of Old English and the German spoken by the Normans. True or False? What standard measurement would be best used to determine how much milk is in a milk carton for lunch? Which of the following is NOT a step in forming a formal command in Spanish? Ignore any yo form changes Take the yo form change is there is one Add the opposite ending add an 'n' if you are commanding multiple people Which could be a form of bias in a map?Check all that apply.>A. When cities are shown in green and countryside shown in yellowB. When south is depicted as being toward the top of the mapC. When road is labeled according to federal designation instead ofby local names D. When average incomes are given as a single number for an entirecounty Solve 2(4x+2)=4x-12(x-1) Supporters of using the atomic bomb against Japan believed it would save American lives. end the war in Europe. improve relations with China. improve relations with Russia. What is the freezing point of an aqueous 1.00 m NaCl solution? (Kf = 1.86 *C/m) (Assume complete dissociation of the salt.)