1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
10

What are the most popular/up-and-coming social media applications?

Computers and Technology
2 answers:
tekilochka [14]3 years ago
7 0
How about vine camera? or musically?
Leona [35]3 years ago
4 0

I think it would be (f)acebook, (s)napchat, (i)nstagram, (t)witter, and (t)umblr. It's not letting me use the actual names for some weird reason

You might be interested in
Subscribe to my you tube channel to get all your questions answered
vredina [299]

kaaaaaaaaaaaaaaaaa

aaa

4 0
3 years ago
What is the role of the computer in banking system?
Daniel [21]

Answer: In banks, computers are used for keeping account information of customer accounts. Banks use technology to carry out payments effectively and successfully. Computers help bankers keep a record of and verify financial records much quicker. Hope this is helpful.

3 0
2 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
Define the term editing​
Harrizon [31]

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

8 0
3 years ago
A(n) ________ button is one that when you click one time it turns the feature on and when you click again, it turns off.
cupoosta [38]
It's a toggle button
5 0
3 years ago
Other questions:
  • What operating system uses Fastboot?
    10·2 answers
  • Retype the statements, correcting the syntax errors.
    9·1 answer
  • Which trait depicts honesty?
    10·1 answer
  • When users talk about font size,
    10·2 answers
  • Self-contained sequences of actions to be performed are: (1 point)
    14·2 answers
  • N
    10·1 answer
  • What is considered an important ethical consideration when working with families
    13·1 answer
  • If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was
    11·1 answer
  • 11. FROM WHICH MENU WOULD YOU BE ABLE TO FIND COLUMNS? *
    11·1 answer
  • 1. Microsoft Excel, MS Excel, or simply Excel is a______application by Microsoft Corporation. 2. Excel allows you to organize an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!