1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
2 years ago
6

Nearly all social software systems include a(n) ________, which helps control your information flow.

Computers and Technology
2 answers:
laila [671]2 years ago
8 0
Dashboard

Nearly all social software systems include a(n) dashboard, which helps control your information flow.
Alekssandra [29.7K]2 years ago
4 0

Answer:

dashboard

Explanation:

You might be interested in
((GUITAR))<br> What is the letter name for the note shown above?<br><br> D<br> E<br> F<br> G
iren2701 [21]
It is Letter G
Explanation: Took Guitar classes as a kid and memorized the letters.
3 0
2 years ago
In Microsoft Exel, graphs are refered to as_________
algol [13]
The answer is charts D since tables are still referred to as tables
4 0
3 years ago
When an application contains an array and you want to use every element of the array in some task, it is common to perform loops
Elodia [21]

Answer:

 Option A(True) is the correct answer for the above question.

Explanation:

  • An array is used for the collection variables which is of the same type and uses memory in continuous Passion for the storage.
  • When any user wants to use the array then he needs to declare the size and type of the array because array holds the same type of data.
  • For example, int a[5] is an array of integer variable whose name is 'a' and the size is 5 in c language.
  • Anyone can use the array with the help of the index value of the array. The starting index value is 0 and the ending index value is (size-1) for any array.
  • The user can use it by the help of loop, in which the loop variable refers to the index of the array and it starts from 0 and ends in the (size of the array-1).
  • It is because the loop executes the same line multiple times.
  • The above statement also wants to state, which is defined as above. Hence the above statement is true which is referred by option A. Hence option A is the correct answer.
7 0
3 years ago
How to delete nonsense answers to questions I added? please help
DiKsa [7]

in order to delete answers from your questions, you have to rate them one star , or at least that's what I do, and then report it and then brainly will determine if it's something that needs to be taken down or not

5 0
3 years ago
Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
Crazy boy [7]

Option D is the answer.

Option A is rejected because in centralized communication notwork there is no free flow of communication in all directions ( all direction means between all the groups or layers of the network).

Option B is not the answer because centralized and decentralized networks has nothing to do with the size of organizations.

Option C is rejected because decision making process depends on the hard work and technical skills of groups of an organization about a field but not by the network discipline.

Option D is selected because in centralized network the information or decision making power is primarily limited to the upper level or higher members of organization and as mentioned decentralized decides on the basis of decision of all the groups or levels of the network.

5 0
3 years ago
Other questions:
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • The access code for a? car's security system consists of fivefive digits. the first digit cannot be zerozero and the last digit
    13·1 answer
  • Assume you have an Access database with five different tables, including various pieces of information about your client base. Y
    9·1 answer
  • Explain<br> the three types of periodic<br>maintanance. .​
    10·1 answer
  • Create a program that allows the user to pick and enter a low and a high number. Your program should generate 10 random numbers
    14·1 answer
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • How does information promote cooperation and Industry please explain​
    6·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
  • How to add a legend to a graph in excel?
    7·2 answers
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!