1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sav [38]
3 years ago
12

What were the first microblogs known as

Computers and Technology
2 answers:
Norma-Jean [14]3 years ago
8 0

Answer:

Tumblelogs

Explanation:

A microblog is a type of blog that is generally smaller than regular blogs, both in content and in file size. When microblogs began, they were known as <em>tumblelogs</em>. The term began to be used around 2005, but by 2007 the term microblog was more common. Microblogs became popular on sites such as Tumblr and Twitter, and consisted mostly of short sentences, images or links.

Greeley [361]3 years ago
6 0
The first micro blogs was once known a tumblogs
You might be interested in
Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expense
olga_2 [115]

Answer:

1.25 per unit

Explanation:

Number of units to sell = 100,000

Price per unit = 2

Fixed expense = 75000

At break even point :

Revenue = total expenses

Total expenses = fixed cost + variable cost

Let variable cost = x

Revenue = units to sell * price per unit

Revenue = 100,000 * 2 = 200,000

Hence,

Fixed cost + variable cost = Revenue

75000 + x = 200,000

x = 200, 000 - 75000

x = 125,000

Variable cost = 125,000

The variable expense per unit is thus :

Variable expense / number of units

125,000 / 100,000 = 1.25 per unit

7 0
3 years ago
Robert works in a call center and receives a call from Kathy. Kathy says she can no longer access the online reporting applicati
LekaFEV [45]

Answer:

Update the knowledge base article that contains the application's URL in the call tracking application.

Explanation:

Robert did job in such a helpdesk, however, Kathy gets the call. Kathy states she seems to be no more able to control her weekly updates through the internet via her internet browser. A user asks his manager, then the manager informs him that following the update across the holiday, the network group modified that app's Link.  

So, He tells him to ensure that most of the current technicians have been aware. Then, he updates the base of knowledge report throughout the call monitoring framework which includes the app's link.

5 0
3 years ago
What is the structure of an HTML document. pls answer I don't want any links pls explain too  ​
Savatey [412]

Answer:

<em><u>What is a HTML document?</u></em>

It's a text document saved with the extension . html or . htm that contains texts and some tags written between "< >" which give the instructions needed to configure the web page. These tags are fixed and definite and will be currently explained in the tutorials when applied and needed.

<em><u>What is HTML structure?</u></em>

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

<em><u>What is the basic structure of HTML template?</u></em>

An HTML document has two* main parts: head. The head element contains title and meta data of a web document.

<em><u>How is an HTML document structured?</u></em>

An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content.

Explanation :

HELLOOOO ARMY! HOPE U HAVE A WONDERFUL DAY! MAY NAMJESUS BLESS U !

Stream life goes on and dynamite we are about o reach 1B!

And trend these hashtags:

#Westankings

#scammys

<em><u>AND</u></em><em><u> </u></em><em><u>FINALLY</u></em><em><u> </u></em><em><u>,</u></em><em><u> </u></em><em><u>SARANGAE</u></em><em><u> </u></em><em><u>BOROHAEEE</u></em><em><u>!</u></em><em><u>!</u></em><em><u>!</u></em><em><u> </u></em><em><u>♡</u></em><em><u>♡</u></em><em><u>♡</u></em><em><u>♡</u></em><em><u>♡</u></em>

5 0
3 years ago
Read 2 more answers
Disregarding any references or pointers in data elements, i.e., the info components, how many null pointers are there in a prope
fredd [130]

Answer:

There are no null pointers.

Explanation:

Each element in a circular linked list points to exactly one other element, thus closing the loop and making it "circular".

5 0
3 years ago
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
Fudgin [204]

Answer:

Option D i.e., radiation is the correct answer.

Explanation:

When any person challenges the specific security system for the purpose of stealing the resources from the corporate security system then they unable to threaten the radiation because it is the electromagnetic waves that affect the body or skin of any human being and it can be generated by those devices that have high-voltage.

8 0
3 years ago
Other questions:
  • The fossilizing process that replaces organic matter with silica or calcite is:
    13·2 answers
  • The bus width and bus speed together determine the bus's ______ or bandwidth; that is, the amount of data that can be transferre
    5·1 answer
  • What is an establishing shot, and when is it an appropriate shot choice in a film?
    15·2 answers
  • Hich of the following usually indicates that there is no moreinput to be read by a program?
    14·1 answer
  • You rub two red balloons against a wool scarf. What do you think will happen if you place the balloons near each other. Justify
    5·1 answer
  • Which of the following is a form of mediated communication?
    10·1 answer
  • In Windows, the only was to start/stop MySQL Server is from the Command Prompt.
    7·1 answer
  • Ruth-Anne has created a document. She wants page 3 and all the pages after it to be formatted with two columns.
    8·1 answer
  • What is the maximum length of a text field can be?<br>​
    8·2 answers
  • _______ refers to the use of gps or rfid technology to create virtual boundaries that enable software to trigger a response when
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!