1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
4 years ago
15

Interactive sites where users write about personal topics and comment to a threaded discussion are called 

Computers and Technology
1 answer:
Sedaia [141]4 years ago
3 0

The answer to your question is A. blogs

You might be interested in
Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's informatio
pickupchik [31]

Answer:

Yes this is true.

Explanation:

7 0
3 years ago
Which process alters readable data into unreadable form to prevent unauthorized access known as?
EleoNora [17]
Encryption. Using a secret key, the data is encrypted. To decrypt it, the same or a different key is needed. Unauthorised entities should not have such a key.
3 0
4 years ago
Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
torisob [31]
True definitely. They have to use very modern tech in order to make people trust and use them.
3 0
4 years ago
What is the difference between a try block and a try statement? Group of answer choices There is no difference; the terms can be
telo118 [61]

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not language.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and it is uses 0's and 1's. Coders write the instructions using a programming language.

8 0
3 years ago
I know this is not a school type question but i really need some help.
pashok25 [27]
If I'm not mistaken u can't do that but u can go in your settings if u have an iPhone and add that email with your main one.
8 0
4 years ago
Other questions:
  • Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
    6·1 answer
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • geoffrey is on location for a long shoot. he is worried that the battery power in his camera will not last. which source can he
    5·1 answer
  • How many questions do you need to have on brainly before being able to send messages?
    14·1 answer
  • A Homecoming Crossword Puzzle
    12·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • What is binary ????????
    5·2 answers
  • Adios brainly, you were sh.t sometimes, but you had your moments, wont be posting that much take my points away i d c
    6·2 answers
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!