1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
10

When Twitter is used to gather a large group for a face-to-face meeting it is called a

Computers and Technology
1 answer:
diamong [38]3 years ago
4 0
<span>When Twitter is used to gather a large group for a face-to-face meeting it is called a Flash mob. </span>
You might be interested in
3. Maria is in charge of consolidating the names of the participants of the two-day virtual
Lina20 [59]

Answer:

The correct sequence of steps in sorting text is;

III, IV, I and II

Which is option 'C' where the last item is II

C. III, IV, I and II

Explanation:

Sorting is the orderly arrangement of items (data) according to a specified criteria such as arranging a list of items alphabetically or a numerical arrangement of a data collection

Filtering is the selection for display, data that meets a specific condition

To arrange the names of the participants of the two-day virtual seminar alphabetically using MS Excel the sequence of steps are;

1. Select the rows or columns the are to be sorted by using steps for selecting  rows and/or columns

2. Go to the Editing group of the Home Tab ribbon

3. Click on (the down arrow besides) the Sort & Filter command icon to display a drop down menu with options for type of sorting and filtering

4. Choose Sort A to Z to sort the contents of the cell range in increasing alphabetical order

Therefore, the correct sequence of steps are;

III. Select the cell range needed to be sorted

IV. Go to the Editing Styles group of the Home Tab

I. Click the Sort & Filter command. A drop down menu appears

II. Choose Sort A to Z.

The correct sequence is III, IV, I and II.

7 0
3 years ago
A group of network research scientists from nearly 200 universities and a number of major corporations joined together in 1996 t
Leto [7]

Answer:

Internet2

Explanation:

World Wide Web

8 0
3 years ago
What is homgenues mixture??<br><br><br>Please don't post of invalid answer please..!!​
Semmy [17]

Explanation:

a homogeneous mixture is a mixture that it's components can't be seen by our naked eyes

4 0
3 years ago
Read 2 more answers
The key do you use to copy and paste?
Snowcat [4.5K]

Answer:

Copy crl c PASTE is ctrl v

3 0
2 years ago
Read 2 more answers
Two Auto Scaling applications, Application A and Application B, currently run within a shared set of subnets. A Solutions Archit
likoan [24]

Answer:

Using Network Access Control Lists (ACL) to allow/deny traffic based on application IP addresses

Explanation:

ALL Network Access Control List has has distinct inbound and outbound rules.

Each of these rules are configured to either allow or deny traffic.

This is the best and easiest way to achieve the task at hand.

The Network ACL will be configured to allow inbound and outbound traffic for Application A to send and receive requests and only inbound traffic will be allowed for Application B to receive requests only from A

5 0
3 years ago
Other questions:
  • In the simulation, player 2 will always play according to the same strategy. The number of coins player 2 spends is based on wha
    6·1 answer
  • If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending o
    12·1 answer
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • The function below takes one parameter: a string (date_string) containing a date in the mm/dd/year format. Complete the function
    11·1 answer
  • What are the disadvantages of using pointers?
    6·1 answer
  • For the sake of maximizing hardware utilization in a multicore system with a many to many threading model, the relationship of t
    12·1 answer
  • ¿Qué es lo contrario a frágil?
    9·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Will, there be any presents this year
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!