1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
6

NEED HELP ASAP 50 POINTS AND BRAINLIEST SOCIAL MEDIA RELATED

Computers and Technology
2 answers:
Bezzdna [24]3 years ago
6 0

Well the answer is electronic mailing lists because a mailing list is a list of emails used for a company or group to send a mass email to many users at once. The only way to view this mass emails is through an email application.

leva [86]3 years ago
4 0

Question:

What social media technology requires an email application to receive messages from other members in the network?

Answer:

Electronic Mailing Lists

You might be interested in
The two fundamental approaches to moving data through a network of links and switches are
olga55 [171]

Answer:Packet and circuit switching

Explanation: Packet switching is the technique through which the data is sent from the source to destination in the form of data packets on dynamic path.It is the time of connectionless switching and route generates for each packet.

Circuit switching is the switching technique having connected path for the sending and receiving of the data.They have well defined and established path for the transmission of data.

Other options are incorrect because they define the terms that are associated with the data that gets transmitted like bandwidth,transmission rate ,packet etc. These options are not the way in which data transmitted or switched.Thus, the correct option is packet and circuit switching.

6 0
3 years ago
What is property in educational technology
Maslowich
1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.
3 0
3 years ago
What college degrees did Steve Wozniak earn?
kap26 [50]
<span>University of California, Berkeley _ comp sci
De Anza College, _ comp sci</span>
7 0
3 years ago
Why does Linux make use of tasklets (i.e., software interrupts) instead of executing all interrupt-related activity in the (hard
Eddi Din [679]

Answer:

Although some devices can be controlled using nothing but their I/O regions, most real devices are a bit more complicated than that. Devices have to deal with the external world, which often includes things such as spinning disks, moving tape, wires to distant places, and so on. Much has to be done in a time frame that is different from, and far slower than, that of the processor. Since it is almost always undesirable to have the processor wait on external events, there must be a way for a device to let the processor know when something has happened.

That way, of course, is interrupts. An interrupt is simply a signal that the hardware can send when it wants the processor's attention. Linux handles interrupts in much the same way that it handles signals in user space. For the most part, a driver need only register a handler for its device's interrupts, and handle them properly when they arrive. Of course, underneath that simple picture there is some complexity; in particular, interrupt handlers are somewhat limited in the actions they can perform as a result of how they are run.

5 0
3 years ago
When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.
MatroZZZ [7]

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

6 0
3 years ago
Other questions:
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft c
    14·1 answer
  • ________________ is a new method or idea or product or enhancement or other means of adding value to an existing product, such t
    14·1 answer
  • The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
    6·1 answer
  • HI brainly friends....<br> Pease thanks my answers I will also thank your answers
    11·1 answer
  • Does unturned game is good for low end PC that without graphics card?​
    5·1 answer
  • Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
    7·2 answers
  • Follow the directions below to submit Assignment 2:
    11·1 answer
  • Help a brotha out..................
    10·1 answer
  • Q1) What would be the output of the program shown in the figure?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!