1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
5

In the context of social bookmarking, what does tagging allow you to do?

Computers and Technology
2 answers:
tatyana61 [14]3 years ago
4 0

Social bookmarking is a way for people to store, organize, search, and manage “bookmarks” of web pages. Users save links to web pages that they like or want to share, using a social bookmarking site to store these links. These bookmarks are usually public, and can be viewed by other members of the site where they are stored. Examples of social bookmarking sites include del.icio.us  and digg.com .

 

Most social bookmark services are organized by users applying “tags” or keywords to content on a Web site. This means that other users can view bookmarks that are associated with a chosen tag, and see information about the number of users who have bookmarked them. In many cases, users can also comment or vote on bookmarked items.

 

Social bookmarking is also interchangeably sometimes referred to as folksonomy, collaborative tagging, social classification, social indexing, and social tagging. “Folksonomy” is a combination of the words folk and taxonomy, hence a folksonomy is a taxonomy generated by a person or group of people

harkovskaia [24]3 years ago
3 0

organize your bookmarks on social bookmarking sites by category. More simple answer

You might be interested in
Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
Irina-Kira [14]
Answer: I think C


Step by step explanation:
8 0
3 years ago
A(n) _____ is substance in which one or more atoms have the same number of protons (i.e. the same atomic number).
natima [27]

I think it’s Element I think

3 0
3 years ago
What is smallpdf(app) for? How can I use it? ​
Fynjy0 [20]
Smallpdf app is. For windows
Go to your homepage and click a tool
Drag a file into the colored toolbox
Most tools should start working on the file right away
For some tools, further optimization options may be available
Download the converted doc to your local drive
O
)
O
8 0
3 years ago
What countermeasures would you recommend to defend against routing attacks?
Alla [95]

Answer:

 The countermeasure is basically recommended against the attackers for defending various routing attacks. Routing is one of the most generally assaulted segments in a system and a lot of system the executives work centers around checking conduct of switches.

The single router has more than one unit for bundle handling. This encourages quicker handling. This preparing unit is finished programming which can be undermined by an aggressor.

So an additional free equipment is implanted into the switch which can do observing to recognize the product assaults. Maintain a strategic distance from over composition the addresses.

Be movement at time when all of a sudden if anything incorrectly happens we should be in a situation to deal with and deal with the issue since it causes more harm when time runs.

3 0
3 years ago
what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
Elina [12.6K]

Answer:

A Red Black Tree is a type of self-balancing(BST) in this tree ,each node is red or black colored. The red black tree meets all the properties of the binary search tree, but some additional properties have been added to a Red Black Tree.

A Red-Black tree's height is O(Logn) where (n is the tree's amount of nodes).

In a red-black tree with black height k

The maximum number of internal nodes is 2^{2k} -1.

The smallest possible number is 2^{k} -1.

7 0
3 years ago
Other questions:
  • ________-generation languages use symbols and commands to help programmers tell the computer what to do.
    11·2 answers
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • In a certain computation, 90% of the work is vectorizable. Of the remaining 10%, half is parallelizable for an MIMD machine. Wha
    9·1 answer
  • You've just purchased 10 new notebook systems for your users. You are concerned that users will leave the systems on for long pe
    10·1 answer
  • which of the following uses technical and artistic skills to create visual products that communicate information to an audience?
    14·1 answer
  • Once you record your audio and click ok to save it what happens to the recording?
    9·1 answer
  • when you type a day, month, or date, what features does Word use to automatically complete typing the day, month, or date for yo
    6·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
    14·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!