1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
4 years ago
6

What social media technology requires an email application to receive messages from other members in the network?

Computers and Technology
2 answers:
defon4 years ago
4 0

Answer:

Electronic mailing list

Explanation:

Electronic mailing list is a social media technology that is a digital email list that makes it possible to deliver specific messages over the internet/network ( world wide web ) to a large number of people all hooked up to the internet. an Electronic mailing list contains : names of persons, addresses, phone number and a fully detailed message.

there two types of Electronic mailing lists and they are announcement lists and discussion lists. an  Announcement list contains the names and email address of a group of people interested in getting the latest announcements pertaining to a particular topic. while a discussion list contains email address and the details of a group of people interested in the discussion of a topic.

Tanzania [10]4 years ago
3 0
<span>electronic mailing lists</span>
You might be interested in
It is a read mostly memory that can be electronically written into any time without arising prior contact
tatuchka [14]

Answer:

d. EEPROM

Explanation:

EEPROM stands for Electrically erasable programmable read-only memory which is characterized as a non-volatile working memory chipset capable of storing information and distaict on terms of its stability and data retention capability. EEPROM's are very advantageous and provide several up features than most other chipset. The retention ability of information on EEPROM'S such that initial content remains intact while writing even when power is removed. Other memory types mentioned also have their own features, however. EEPROM best suits the description.

3 0
4 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
"what is the #1 resource used when researching a product online?"
BARSIC [14]
I believe it would be customer reviews.
6 0
3 years ago
(03.05 LC) Match the term with its description. (4 points) Column A 1. Acid : Acid 2. Alkaline : Alkaline 3. pH : pH 4. Ion : Io
Nady [450]

Answer:

Follows are the matching to this question:

Explanation:

Column  A            Column B

     1                           c

     2                          d

     3                          b

     4                          a

Description of the matching:

  • In 1(Acid) the correct choice is (c) because the acid (HCl) dissociates to both the H+ ion and the Cl- ion as a solution.  
  • In 2(Alkaline ) the correct choice is (d) because alkaline NaOH is a solution that differentiates between the ions ( OH-) and Na+.  
  • In 3(pH ) the correct choice is (b) because for an A compound of less than 7 is an acid and an alkaline pH compound of more than 7. For neutral compounds, a pH of 7 is applicable.
  • In 4(Ion) the correct choice is (a) because Na+ ion is loaded positive, and Cl-ion is loaded negatively.
8 0
3 years ago
7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802
Black_prince [1.1K]

Answer:

7.1)

BSS (Basic Service Set) is a basic building block of  802.11 wireless LAN.

It is the wireless station that executing the similar competing and the MAC protocol for accessing a similar wireless system is shared.

7.2)

The Extended Service Set is one of the basic components of IEEE 802.11 WLAN architecture which increases the mobility range to the individual BSS (Basic Service Set).

An ESS is the set that contains two or more than two Basic Service Sets

that forms an individual sub-network.

7.3)

The IEEE 802.11 service has the MAC layer implement which falls in two categories:

  1. Service Station.
  2. Distribution System Service.

Service Station - 802.11 standard has defined the services which is providing the functions among the stations.

It includes the following components:

  • Authentication
  • Deauthentication
  • Privacy
  • MSDU delivery.

Distribution System Service - It defined by the 802.11, provides the functionality across the distribution system and access point also provides the DSS.

It includes the following components:

  • Association  
  • Disassociation  
  • Distribution  
  • Integration  
  • Reassociation.

7.4)

It either may be or either not be a wireless network.  

Because distribution system has these three things:

  • Wired network
  • Wireless network
  • A switch

7.5)

Association agrees on the set security capabilities to use.

It also allows the mobile node which has made the transition to identifies itself to the AP (Access Point) within a BSS so that's why the nodes can be participated in the data exchanges with  another mobile nodes.

7.6)

The IEEE 802.11i are addresses the three types of security areas:

1) authentication,

2) key management,

3) data transfer privacy.

7.7)

7 0
3 years ago
Other questions:
  • Type the correct answer in the box.
    7·1 answer
  • With a(n) ____, you can enter a value either by typing the value or by selecting it from a list.
    14·1 answer
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • Which is a group of related software applications that are bundled and sold together?
    9·2 answers
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • Look at the following program and answer the question that follows it. 1 // This program displays my gross wages. 2 // I worked
    8·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • What will happen when you run this program?
    12·2 answers
  • Consider a Dog class and a Mammal class. Which is true? Group of answer choices The Dog class is abstract The Mammal class is co
    10·1 answer
  • Suppose you made an error while creating your document. You used the word b. Find and Replace dialog box "SDAM" instead of "SIMA
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!