1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
4 years ago
12

A text-only forum accessed through a bulletin board service (BBS) is known as a _____.

Computers and Technology
1 answer:
Tcecarenko [31]4 years ago
3 0

Answer:

newsgroup---for apex

You might be interested in
Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
AleksandrR [38]

Answer:

False

Explanation:

4 0
2 years ago
Read 2 more answers
WAp to input the radius and print<br> the area of circle
Sergeu [11.5K]

Program:-

\tt r=float(input("Enter\:the\:value\:for\:radius\:of\:circle"))

\tt x=3.14*\:r**2

\tt print("Area\:of\:Circle=\{x\}")

<h3>Sample run:-</h3>

\tt r=3

\tt Area\:of\:the\:circle=28.26

7 0
3 years ago
Subratract 11100 from 1011 by using 1's complement method step by step​
tia_tia [17]
10089 is gonna be your anwser
7 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
Type the correct answer in the box. Spell all words corre ctly.
Andru [333]

Answer:

publication file I think ?

5 0
3 years ago
Read 2 more answers
Other questions:
  • How can you best protect yoursel and when using social media
    14·2 answers
  • T-shaped, square-bottomed, dovetailed, and V-shaped are all types of _______ in a machined part. A. gears B. bolts C. lines D. s
    8·2 answers
  • I thought the answer was senior manager see on google it says
    8·1 answer
  • What specific tool allows you to create GPOs, view a GPO's settings, link and unlink GPOs with containers, and manage the inheri
    10·1 answer
  • Write a function named remove_duplicates that takes a list (of numeric and/or string values) and returns a new list with only th
    9·1 answer
  • Write a routine to interchange the mth and nth elements of a singly-linked list. You may assume that the ranks m and n are passe
    10·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • Select the one that uses the heading tag correctly. <br><br>a. <br><br><br>b. <br><br>c. <br><br>d.
    12·2 answers
  • if prakash gives one of the marble from what he possessses to kamala then they will have equal number of marbles.if kamala gives
    10·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!