Billie downloads an email attachment from a co-worker. The attachment contains a virus. Within minutes of downloading the file, Billie's computer shuts down and will not turn back on. The company uses an intranet network. How did a virus most likely get into the original file sent to Billie? Explain your answer.

Answers

Answer 1

Answers:

You suspect that you have accidentally downloaded a virus.Turn off his computer and reboot from a clean system disk.She has no reason to expect a file from this person.Lisa has received a file attachment from a co-worker, James.The attachment contains a virus.
Answer 2

The virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

How do viruses get into files?

A  lot of Computer Viruses are known to often spread to other disk drives or computers  mostly wen an infected files are gotten through downloads that are gotten from websites, email attachments, etc.

Note that the issue is that virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

Learn more about email attachment from

https://brainly.com/question/17506968

#SPJ2


Related Questions

Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the function to set the value of the corresponding data member if the data member has the same name as the parameter

Answers

Answer:

Explanation:

This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.

class Employee:

   age = 0

   

   def __init__(self):

       pass

   

   def set_age(self, age):

       self.age = age

As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.        

Hello all i need help on my next task on Procedural Programming, ive tried to understand many times but i keep getting misled, im a beginner.

Objective
Name: Dot product
Description:
Write a procedure, called dot_product which calculates in the variable ps, the dot(scalar) product of v1 and v2 (v1 and v2 are vectors of IR)
Write an algorithm which determines, for n pairs of given vectors, whether two vectors of given IR are orthogonal, by calling the procedure defined in the previous question. The dot product of two orthogonal vectors is zero.
Modify the previous algorithm if you use a dot_product function instead of a procedure.

Instructions:
Use array for presenting the vector.
Use nested loop (a loop inside another)
Use different types of passing parameters

Answers

Answer:

https://opentextbc.ca/calculusv3openstax/chapter/the-dot-product/

Explanation:

hope its hlp you to understand to find the answer

The `dot_product` is defined as a function, and it returns the dot product value instead of storing it in a variable.

How did we realize this dot product?

Let's break down the task into various steps and work on them one by one.

1. Implementing the dot_product procedure: To calculate the dot product of two vectors, you need to multiply the corresponding elements of the vectors and sum them up. Here's an example implementation of the dot_product procedure in a procedural programming language:

procedure dot_product(v1, v2):

n = length(v1) # Assuming both vectors have the same length

ps = 0 # Initialize the dot product variable to zero

for i = 1 to n:

ps = ps + v1[i] * v2[i] # Multiply corresponding elements and add to the dot product variable

return ps

In this procedure, `v1` and `v2` are the input vectors, and `ps` is the dot product result.

2. Checking if vectors are orthogonal: Now, let's write an algorithm to determine whether two vectors are orthogonal by calling the `dot_product` procedure. We'll use a nested loop to iterate over pairs of vectors.

algorithm check_orthogonal_vectors(vectors):

n = length(vectors) # Number of vector pairs

for i = 1 to n:

v1 = vectors[i][1] # First vector in the pair

v2 = vectors[i][2] # Second vector in the pair

ps = dot_product(v1, v2) # Call the dot_product procedure

if ps == 0:

output "The vectors", v1, "and", v2, "are orthogonal."

else:

output "The vectors", v1, "and", v2, "are not orthogonal."

In this algorithm, `vectors` is an array containing pairs of vectors. Each pair should be a 2D array where the first element represents the first vector and the second element represents the second vector.

Modifying the algorithm using a dot_product function: If you want to use a function instead of a procedure for calculating the dot product, here's how you can modify the previous algorithm:

function dot_product(v1, v2):

n = length(v1) # Assuming both vectors have the same length

ps = 0 # Initialize the dot product variable to zero

for i = 1 to n:

ps = ps + v1[i] * v2[i] # Multiply corresponding elements and add to the dot product variable

return ps

algorithm check_orthogonal_vectors(vectors):

n = length(vectors) # Number of vector pairs

for i = 1 to n:

v1 = vectors[i][1] # First vector in the pair

v2 = vectors[i][2] # Second vector in the pair

ps = dot_product(v1, v2) # Call the dot_product function

if ps == 0:

output "The vectors", v1, "and", v2, "are orthogonal."

else:

output "The vectors", v1, "and", v2, "are not orthogonal."

In this modified version, the `dot_product` is defined as a function, and it returns the dot product value instead of storing it in a variable.

learn more about dot product: https://brainly.com/question/30751487

#SPJ2

How many comparators are required for an m-way set associative cache to locate a block that has n words

Answers

Answer:

Explanation:

mmmmmmmmmmmmmmmmmmmm jkmmmmm kjkjjkjkjk

PLEASE I NEED HELP, WILL MARK BRAINLYEST!!! 50 POINTS!!!
Select the correct answer.
Production teams share a script between them, and the script is a collaborative effort. Which action is important to keep its character intact?
A.
develop the structure of the screenplay
B.
mention the details of the genres and the subgenres
C.
develop the hook
D.
create a sales pitch

Answers

Answer: Develop the structure of the screenplay

Explanation:

The screenplay helps the team find the character of the film and develop it.

Answer: B.

mention the details of the genres and the subgenres

Explanation:

Right on test

For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that allows for multiple modes of operation? What features make this mobile device durable enough for use in the field? In your opinion, what feature(s) of the P25 Mobile makes it ideal for police work?

Answers

Answer:

The specific purpose for the design of the TM9400 P25 Mobile is its use for efficient communication with other emergency-handling jurisdictions, especially in challenging environments.

When a law enforcement officer requires a dedicated mobile network for communication in emergency situations, the TM9400 P25 Mobile comes handy.  It enables the officer to communicate under multiple operational modes from remote locations.

Encryption, together with its high quality audio and rugged build, ensures the durability of the TM9400 P25 Mobile.

The ability to communicate from many places, embedded into its interoperability, allows different law enforcement jurisdictions to seamlessly exchange intelligence.  It also has remote network management features, which enhance its spectral efficiency and effectiveness.

Explanation:

The TM9400 P25 Mobile is a high-performance, flexible, and robust radio specially designed for emergency situations. It is widely used by law enforcement officers to communicate with others from remote locations.

Things are created to meet a purpose.  The Tait TM9400 is known to be a very high-performing, flexible and robust mobile. It was set up for use in difficult environments while helping to give high quality audio and brilliant operation to the first responders all over the world.

The purpose of TM9400 P25 mobile designed is Challenging environment for effective communication use along with other emergency-handling cases.

It is often used by law enforcement officer because of  emergency situation as it comes in handy.  It helps the officer to communicate under a lot of operational modes from remote areas.

Learn more about Phones from

https://brainly.com/question/917245

A network-based attack where one attacking machine overwhelms a target with traffic is a(n) _______ attack.

Answers

HELLO!

Answer:

''Denial of Service'' also known as ''DoS''

Explanation:

It's ''Denial of service'' this is because it means an attack that mean to be shutting down a machine or network. So, ''Denial of Service'' best fits in this sentence.

Write a program to find the sum and product of all elements of an array of size 10. Take input from user.

Answers

Answer:

mark me brainleist

Explanation:

#include<iostream>

using namespace std;

int main ()

{

   int arr[10], n, i, sum = 0, pro = 1;

   cout << "Enter the size of the array : ";

   cin >> n;

   cout << "\nEnter the elements of the array : ";

   for (i = 0; i < n; i++)

   cin >> arr[i];

   for (i = 0; i < n; i++)

   {

       sum += arr[i];

       pro *= arr[i];

   }

   cout << "\nSum of array elements : " << sum;

   cout << "\nProduct of array elements : " << pro;

   return 0;

}

Write a program called nearest_multiple.py that asks the user to input a number (here I will call it num) and a strictly positive integer (here I will call it mult) and prints as output the closest integer to num that is a multiple of mult

Answers

Answer:

The program is as follows:

num = float(input("Enter a decimal (float): "))

mult = int(input("Enter a positive whole (int): "))

small = (num // mult) * mult

big = small + mult

print(num,"rounded to the nearest multiple of ",mult,"is",end=" ")

print(big if num - small > big - num else small)

Explanation:

This gets input for num

num = float(input("Enter a decimal (float): "))

This gets input for mult

mult = int(input("Enter a positive whole (int): "))

This calculates the smaller multiple

small = (num // mult) * mult

This calculates the larger multiple

big = small + mult

This prints the output header

print(num,"rounded to the nearest multiple of ",mult,"is",end=" ")

This prints small if small is closer to num, else it prints big

print(big if num - small > big - num else small)

How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.

Answers

Answer:

B?

Explanation:

I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B

Answer:

the guy above is right it is B

Explanation:

because 2+2=4

What is the purpose of the property, transition-timing-function?
It sets how many times a transition will play.
It delays the start of a transition by a set number of seconds.
It changes the speed at different stages of the transition.
It adds a pause between steps in an animation.

Answers

Answer:

It changes the speed at different stages of the transition.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

Basically, the purpose of the property, transition-timing-function is that It changes the speed at different stages of the transition. Thus, it states the values between the beginning and ending of a transition are calculated over its duration.

What will be the output of the following JavaScript code? functioncomparison() { int number=10; if(number= = ="10") return true; else return false; } Single choice. (0.5 Points) True false runtime error compilation error

Answers

Answer:

(b) false

Explanation:

Given

The above code

Required

The expected output

First, variable number is declared as integer and then initialized with 10

Next, the === compares the integer 10 with string "10"

10 and "10" are different type and === will return true if the compared values and/or variables are of the same type.

Since 10 and "10" are different, the expected output is false

The output of the following JavaScript code is false.

Let's write the code appropriately,

functioncomparison() {

int number = 10;

if (number= = ="10")

return true;

else

return false;

}

A function  functioncomparison() is declared.

Then the integer number is assigned as 10.

The conditional "if" says if the string 10 is equals to the integer number 10.

The triple equals signs(===)check for the type and the actual value.

The string "10" and integer 10 are not the same type. "10" is a string and 10 is an integer.

Therefore, the output of the code will be false.

learn more about JavaScript conditional here:  https://brainly.com/question/17115445?referrer=searchResults

list and describe each of the activities of technology

Answers

Answer:

network has led to exposure of dirty things to young ones.

air transport has led to losing of lives

In BSD socket API,which call is used for transmitting data in the connectionless mode?

Answers

Answer:

UDP is the answer

Explanation:

UDP enables best-effort connectionless transfer to individual block of information, while TCP enables reliable transfer of a stream of bytes. That's two modes of services available through the circuit interface, connection-oriented and connection-less.

For which two reasons might a designer use contrasting colors on a web page?

Answers

Check box 2 and 3. Those are both correct.
Contrasting colours are bound to bring attention to certain things such as messages and it could also be a pretty aesthetic which is appealing and will improve and boost interactions

tell me the most scariest website you know and i'll give you brainlest

Answers

Answer:

it's not a website but on insta there's an account that freezes people's phone when you click on their story.

Explanation:

Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be

Answers

Answer: Theme colors

Explanation:

Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.

It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.

write a program to enter 30 integer numbers into an array and display​

Answers

Answer:

i764

Explanation:

Answer:

Explanation:

Python:

numberlist = []

for i in range(0, 29):

   a = input("Enter a number: ")

   numberlist[i] = a

print(*meh, sep = "\n")

consider a memory system with a memory access time of 150 ns and a cache access time of 20ns. If the effective access time is 20% greater than the cache access time, what is the hit ratio H g

Answers

Answer:

H = 0.7333333

Explanation:

Given that:

The memory access time ([tex]T_m[/tex]) = 150 ns

The cache access time [tex](T_c)[/tex] = 20 ns

Effective access time [tex](T_e)[/tex]  = 20% > [tex](T_c)[/tex]

Then, it implies that:

= [tex](T_c)[/tex] + 20% of

=[tex](T_c)[/tex](1+20%)

=[tex](T_c)[/tex](1+ 0.2)

= 20ns × 1.2

= 24ns

To determine the hit ratio H;

Using the formula:

[tex]T_e = T_c \times H+(1-H) \times (T_c + T_m) \\ \\ T_e = HT_c + T_c + T_m -HT_c -HT_m \\ \\ T_e = T_c +T_m - HT_m \\ \\ T_c -T_e = T_m (H-1) \\ \\ H-1 = \dfrac{T_c -T_e}{T_m} \\ \\ H = 1+ (\dfrac{T_c -T_e}{T_m})--- (1)[/tex]

Replacing the values; we have:

[tex]T_c - T_e = 20ns - 24 ns \\ \\ T_c - T_e = -4 ns \\ \\ \dfrac{T_c - T_e }{T_m} = \dfrac{-4 ns}{150} \\ \\ \dfrac{T_c - T_e }{T_m} = -0.02666667[/tex]

From (1)

[tex]H = 1+ (-0.2666667) \\ \\ H = 1 - 0.2666667 \\ \\ \mathbf{H = 0.7333333}[/tex]

g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3

Answers

Answer:

The answer is  "200.5.0.0 32/28".

Explanation:

The requirement of the Bldg is =30.

The number of the host bits which is needed = 5

Therefore the subnet mask will be =/27

for bldg 3 netmask could be= /28

and when the /28 after that the last octet will be= 00100000.

00100000 converting value into a decimal value that is = 32.

therefore the correct value is 200.5.0.32 /28.

hello! can someone write a c++ program for this problem

Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data

10
6
6
6
6
6
6
6
6
6
6
Output data
1

Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.

Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0

Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.

Answers

Answer:

f0ll0w me on insta gram Id:Anshi threddy_06 (no gap between I and t)

Write a method called lexLargest that takes a string object argument containing some text. Your method should return the lexicographical largest word in the String object (that is, the one that would appear latest in the dictionary).

Answers

Answer:

public static String lexLargest(String text){

       //split the text based on whitespace into individual strings

       //store in an array called words

       String[] words = text.split("\\s");

       

       //create and initialize a temporary variable

       int temp = 0;

       

       //loop through the words array and start comparing

       for(int i = 0; i < words.length; i++){

           

           //By ignoring case,

           //check if a word at the given index i,

           //is lexicographically greater than the one specified by

           //the temp variable.

          if(words[i].compareToIgnoreCase(words[temp]) > 0){

               

               //if it is, change the value of the temp variable to the index i

              temp = i;

           }    

       }

       

       //return the word given by the index specified in the temp

               // variable

       return words[temp];

    }

Sample Output:

If the text is "This is my name again", output will be This

If the text is "My test", output will be test

Explanation:

The code above has been written in Java. It contains comments explaining the code. Sample outputs have also been given.

However, it is worth to note the method that does the actual computation for the lexicographical arrangement. The method is compareToIgnoreCase().

This method, ignoring their cases, compares two strings.

It returns 0 if the first string and the second string are equal.

It returns a positive number if the first string is greater than the second string.

It returns a negative number if the first string is less than the second string.

Write a recursive function that has an argument that is an array of characters and two arguments that are bounds on array indexes. The function should reverse the order of those entries in the array whose indexes are between the two bounds. For example, if the array is a[0]

Answers

Answer:

The function is as follows:

void revArray(char arr[], unsigned int low, unsigned int high)  {  

      if (low >= high){

        return;  }

  swap(arr[low], arr[high]);  

  revArray(arr, low + 1, high - 1);  }

Explanation:

This declares the function. It receives a char array and the lower and upper bounds to be reversed

void revArray(char arr[], unsigned int low, unsigned int high)  {  

This is the base case of the recursion (lower bound greater than or equal to the upper bound).

      if (low >= high){

        return;  }

This swaps alternate array elements

  swap(arr[low], arr[high]);  

This calls the function for another swap operation

  revArray(arr, low + 1, high - 1);  }

In python, Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.

Answers

I am assuming that user_val is an inputted variable and a whole number (int)...

user_val = int(input("Enter a number: "))

if user_val < 0:

   print("negative")

else:

   print("non-negative")

What will the declaration below do to its target?

animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.

Answers

The animation steps will play forward then backward

What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to

Answers

Answer:

b i think

Explanation:

A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.

Answer:

The answer is D. The type of website the URL points to.

Explanation:

I got it right on the Edmentum test.

Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest number and the second smallest number. Note that in the case of repeated numbers, we really mean the second largest and smallest out of the distinct numbers (as seen in the examples below). You may only use the headers: and . Please have the output formatted exactly like the following examples: (the red is user input) Enter integers (Q to quit): 1 2 1 8 8 9 Q Second largest: 8 Second smallest: 2 Enter integers (Q to quit): -7 -101 0 -2 17 Q Second largest: 0 Second smallest: -7

Answers

Answer:

The program in C++ is as follows:

#include <vector>

#include <iostream>

using namespace std;

int main(){

   vector <int> my_num;

   string sentinel;

   int n = 0;

   cout<<"Enter integers (Q to quit): ";

   cin>>sentinel;

   while(sentinel != "Q"){

       my_num.push_back(stoi(sentinel));

       n++;

       cin>>sentinel;    }

      int n1, n2;

      n1 = my_num.at(0);      n2 = my_num.at(1);

      if(my_num.at(0)<my_num.at(1)){     n1 = my_num.at(1);  n2 = my_num.at(0);   }

      for (int i = 2; i< n ; i ++) {

          if (my_num.at(i) > n1) {

              n2 = n1;

              n1 = my_num.at(i);     }

           else if (my_num.at(i) > n2 && my_num.at(i) != n1) {

               n2 = my_num.at(i);     }  }

       cout<<"Second Largest: "<<n2<<endl;

       n1 = my_num.at(1);       n2 = my_num.at(0);

       if(my_num.at(0)<my_num.at(1)){ n1 = my_num.at(0);  n2 = my_num.at(1);   }

       for(int i=0; i<n; i++) {

           if(n1>my_num.at(i)) {  

               n2 = n1;

               n1 = my_num.at(i);            }

           else if(my_num.at(i) < n2){

               n2 = my_num.at(i);     }  }

 cout<<"Second Smallest: "<<n2;

 return 0;

}

Explanation:

See attachment for explanation

Question #4
Math Formula
What will you see on the next line?
>>>int(3.9)

Answers

Answer:

3

Explanation:

The correct answer is 3. The int() function truncates the decimal part.

-Edge 2022

In our discussion of Linear-Time Sorting, we talked about an algorithm called radix sort, which does successive iterations of another algorithm called counting sort, with each of those iterations focused on one digit (e.g., sorting by the last digit and ignoring all the others, sorting by the second-to-last digit and ignoring all the others, or whatever). Suppose that you replaced counting sort, at each step, with a hypothetical algorithm that was faster than counting sort but was not stable. If you did, would you expect radix sort to still come up with a correct result

Answers

Answer:

Explanation:

Suppose we use some other sorting technique as the subroutine for radix sort to sort the digit, it will be unstable. The final outcome will not be accurate and correct. This is due to the fact that Unstable sort does not retain the order for equal components, thus whatever sorting was done before for lower significant bits might be screwed up by the next significant bit at that level that possesses the same value.

Consider the following scenario:

[431, 135, 132]

⇒ [431,132,135] (The least significant bit is used in the first step of sorting.)

⇒ [132, 431, 135] (Because the sorting algorithm was not reliable, the second level of sorting screwed up the preceding sorting.)

As a result, we will never receive an accurate and coorect outcome in this scenario.

At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes and/or the __________.

Answers

The available options are:

A. Arrival time differs by more than 3 minutes

B. Aircraft is issued an approach other than the tower specified

C. Verbal coordination has not been yet accomplished

Answer:

Aircraft is issued an approach other than the tower specified

Explanation:

Considering the situation described in the question, and according to Instrument Flight Rules (IFR), Approach Clearance Procedures, when at Greenwood Air Traffic Control Tower (ACTC), arrival information need not be forwarded while Flight Data Input-Output (FDIO) operational unless the sequence of aircraft changes and the "Aircraft is issued an approach other than the tower specified."

In which situation is coauthoring of presentations primarily utilized?

A) A reviewer must be able to make changes to a presentation after an author creates it.

B) Multiple authors must be able to simultaneously make changes to a presentation.

C) Multiple reviewers have to be able to view one another's changes after they are made.

D) One author and one reviewer work on a presentation at different times.

Answers

Answer:

C) Multiple reviewers have to be able to view one another's changes after they are made.

Explanation:

Other Questions
I really need help plsssssssssssssss help Kasey needs to get 80% of his questions correct on his math test to get B for the quarter. If his test has 60 questions, how many questions will he need to get right? Write a MY SQL query to display the name and hire date of all employees who were hired in 1992. Which equation models the statement shown? y varies directly with x and =25 y = 25 when =5 x = 5 . A balloon has a volume of 1.40 L at 24.0C. The balloon is heated to 48.0C. Calculate the new volume of the balloon. A 1.50 LB 2.10 LC 1.70 LD 1.80 L After Bismarck became the prime minister of Prussia, this nation provoked Denmark and later France into war. What does this suggest about Bismarck as a leader? How does fast food package hurt the environment sheer means:gracefulharriedthinunfortunate please help me. justify your answers! Sheffield Corp. sold $134000 of goods and accepted the customer's $134000 9%, 1-year note receivable in exchange. Assuming 9% approximates the market rate of return, what would be the debit in this journal entry to record the sale WILL GIVE BRAINLIEST If I can type 120 words in 3 minutes, what is my rate per minute? why do the faberege eggs vary in size Hi help me pls... i. really need it How much more is 120hrs than 10 hours is anyone in k12 spanish 2b ?? and can give me answers /srs f(x) = - 2x - 3g(x) = 3x + 1Find (f .g)(x). The diagram shows that many generations of genetic changes led to the modern-day giraffe.Based on the diagram, it is plausible that the giraffe formedA a narrower head to reach deep into trees and eat food that is hard to reach.B a longer neck to reach food in higher areas when food is scarce.C more spots to attract mates to produce offspring.D longer legs to attack predators that approach. sum of two numbers be 95. if one exceeds the other by 15, find the number A new parabola, g(x), is translated from f(x) using the translation T(-3, 7).5. What is the vertex point of g(x)?Explain how you know.