1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
4 years ago
9

How can an installation be a tool for community building?

Computers and Technology
1 answer:
gladu [14]4 years ago
6 0

Answer:

<h3>ou can check out Tribe to build an integrated and fully customizable online community. </h3><h3> </h3><h3 />

Explanation:

You might be interested in
दूलह श्री रघुनाथ बने दुलही सिय सुंदर मंदिर माहीं।
svetlana [45]

Answer:

The bridegroom Shri Raghunath, Gavati Geet Sabai Mili Sundar Bed Juwa Jury Vipra Padhahin, Janaki, and Kankan.

Explanation:

8 0
3 years ago
What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
Anuta_ua [19.1K]

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

5 0
3 years ago
Please Help! I will give a Brainliest to anyone who answers with the right answer! Please and Thank You! What view is most often
Nata [24]

Answer:

form is used ethier to display or enter data in access 2016

8 0
3 years ago
you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting p
Romashka-Z-Leto [24]

Answer:

Cloud access security brokers

Explanation:

Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.

It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.

7 0
3 years ago
Objects both in the real world and in object-oriented programming contain ____ and methods.
larisa86 [58]

Objects both in the real world and in object-oriented programming contain <u>attributes</u> and methods.

<h3>What is an attribute?</h3>

In Computer technology, an attribute can be defined as a unique characteristic or quality which primarily describes an entity in a software program.

<h3>What is a method?</h3>

In Computer programming, a method can be defined as a block of executable code (sets of instruction) that are written and used by programmers to break down a given problem into small but manageable fragments (pieces).

This ultimately implies that, methods are typically written and used by programmers to break down any complex problem into simple and manageable fragments (pieces). Also, all modern programming languages comprises several methods that are predefined.

In this context, we can infer and logically deduce that all objects both in the real world and in object-oriented programming generally contain <u>attributes</u> and methods.

Read more on methods here: brainly.com/question/25619349

#SPJ4

6 0
2 years ago
Other questions:
  • Complete each statement by choosing the correct answer from the drop-down menu.
    10·1 answer
  • An example of software is
    9·2 answers
  • What kind of bond is created by the attraction between atomic particles of opposite charge?
    7·2 answers
  • Websites using www showed up on the internet for the first time in -992
    9·1 answer
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve
    13·1 answer
  • if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
    7·1 answer
  • Tina has made a database table in access containing field name class roll number and contact number she has set primary key for
    5·1 answer
  • What is after gigabyte
    12·2 answers
  • Which of the following is not a Nintendo game character?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!