1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
13

Nowadays, most online discussion boards are on Web-based forums that provide a variety of user-friendly tools to create and post

discussions. Users can easily follow controversial threads. The precursors to web forums was _______________, created in 1979, which even today provides users access to thousands of discussion boards.
a) analog television.
b) the camera obscure.
c) line.
d) chat room messaging.
e) Usenet.
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
5 0

Answer:

The correct answer to the following question is option e.) Usenet.

Explanation:

Usenet - it  is a collection of the user-submitted messages or notes on the various subject that posted to the servers on the worldwide network. Each of the subject collection of notes is known as newsgroups. There are thousands of the newsgroups which is possible for us to form the new one.

It works like the decentralized computer network which allows us to download our required files. We can also download and access the binary files along with the text post.

You might be interested in
Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. redirecting users to
sweet-ann [11.9K]

Answer:

Explanation:

Pharming involves redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. An individual can accomplish this by changing the hosts file of the web address that the user is trying to access or by exploiting a DNS server error. Both of which will allow the individual to convince the victim that they are accessing the website that they were trying to access, but instead they have been redirected to a website that looks identical but is owned by the individual. The victim then enters their valuable and private information into the website and the individual can see it all and use it as they wish. Usually, this is done to steal banking information.

7 0
3 years ago
What Is the purpose of coding?
zepelin [54]

Answer:

To give the computer an understanding of what it should do and how that task should be completed. It may look like gibberish, but the computer understands it. (There are also many languages of code)

5 0
3 years ago
Read 2 more answers
—— wavy lines will show passive sentences and —- wavy lines will sho misspelled words in the document.
Zolol [24]

Answer:

I know red is for misspelled words.  I think the other one is green.

Explanation:

I hope this helps and is correct.

6 0
3 years ago
Read 2 more answers
Which of the following would be the least effective reference?
8090 [49]
The correct answer is your grandfather who would be a great business owner is: B
4 0
3 years ago
Read 2 more answers
VAX is an example of a:​
Dmitry_Shevchenko [17]

Answer:

VAX architecture is an example of the CISC (Complex Instruction Set Computers) therefore there are large and complicated instruction sets used in the system. Memory: VAX architecture consists of 8- bit bytes memory

8 0
3 years ago
Other questions:
  • What is primary storage
    11·2 answers
  • What is the block of text at the bottom of the page called?
    7·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    6·1 answer
  • Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
    9·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
    15·2 answers
  • Which programming languages is best for game development? ​
    10·1 answer
  • What are the characteristics of computer. Explain any one​
    15·2 answers
  • What is a data source in OLE?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!