1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
12

What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
7 0


The four primary factors that set the stage for web 2.0 of the social web are following:  broad bandwidth, sustainable business models, new web programming technologies and application programming interfaces.
• Broad Bandwidth which technology developments have been taking place at a faster situation and the availability of internet has remarkably increased over the years through the rise of broad band technology. The broadband increase in easy accessibility laid a strong base for social web or web 2.0.

• Sustainable Business Model which E-commerce took its roots and has proven a great success rate.

• New Web Programming Technologies which includes web content, web client, server scripting and network security.

• Application Programming Interface is a system of resources and tools in an operating system which enables the developers to create software applications.
You might be interested in
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
What is the dark, sticky substance that forms when tobacco is burned?
sashaice [31]

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

7 0
2 years ago
1. Suppose the memory address in an embedded system has 12 bits. How many unique memory locations can this 12-bit address access
const2013 [10]

Answer:

14 bits memory address - 4096 bits.

16 bits memory address - 16384 bits.

Explanation:

The computer system memory is a hardware component that provides the necessary memory space and location to run software application on the computer system. The memory address location comes in various sizes.

A 14 bit memory can address 2^14 bits which is 4096 bits, since each 14 bit line carries a bit on which line. So for a 16 bit memory address, 2^16 bits location is addressed.

3 0
3 years ago
When using the strcat function, you must be careful not to overwrite the bounds of an array?
77julia77 [94]

If this is a true or false question the answer is true.

5 0
3 years ago
What will happen if more than 2 devices attempt to access the internet ?
Lemur [1.5K]
Well it depends what kind of Internet u have
5 0
3 years ago
Other questions:
  • My computer keeps shutting down I've tried to completely wipe the memory but it didn't work do you have any ideas how to fix it
    7·1 answer
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • A student who sets a date to finish a goal is using which SMART goal? relevant, specific, attainable or timely
    10·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • Andy wants to install a new Internet connection. He wants to take the fastest he can get. What are the maximum speeds for the fo
    9·1 answer
  • The study of a current business and information system application and the definition of user requirements and priorities for a
    5·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • How can a cell phone tower help people​
    11·2 answers
  • EASY What does the Backspace key do?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!