1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
6

Which of the following is a popular online forum?

Computers and Technology
1 answer:
Aliun [14]3 years ago
3 0
4chan

it isn’t really commonly used anymore by the general population but it is a forum, whereas the other options aren’t forums.

for example, yelp is a review website and amazon is an online shopping site. buzzd is less known but i believe that it is a review website also.
You might be interested in
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
4 years ago
What should you do when you are working on an unclassified system and receive an email.
koban [17]

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

3 0
2 years ago
The user cannot use a computer system without.................... software<br><br>​
zheka24 [161]

Answer:

the user cannot use a computer system without hardware and software

4 0
3 years ago
Read 2 more answers
Suppose that a local area network requires seven letters for user names.​ lower- and uppercase letters are considered the same.
Naddik [55]
<span>If a user name can have seven letters (with no distinction between upper and lower case), and if a letter can be repeated, then the maximum number of names is 26x26x26x26x26x26x26, or 8,031,810,176. That is, slightly more than eight billion names are possible.</span>
6 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Other questions:
  • Discuss anomaly detection.
    5·1 answer
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
  • Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name
    12·1 answer
  • Why is computer economics important?​
    10·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
  • Which backup requires a small amount of space and is considered to have an involved restoration process?
    15·1 answer
  • Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of thin
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!