1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
9

By using the search functionality within a twitter stream, users can filter for:

Computers and Technology
1 answer:
rosijanka [135]3 years ago
6 0
By using the search functionality within a twitter stream, users can filter for: Tweets containing keywords and key phrases, Tweets from specific users, Tweets containing @mentions, Tweets from specific locations.  <span>The secret to using Twitter effectively is using the Twitter lists. </span>Each Twitter list you create, gives you a different Twitter stream, customized to your liking. It will only include tweets sent out by those accounts you have added to the list
You might be interested in
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
Declaring a variable in the method’s body with the same name as a parameter variable in the method header is ___________.
icang [17]

Answer:

a. a syntax error

Explanation:

When the same variable name is repeated in the parameter set and the method body, it will result in a syntax error. This is because the variable in the parameter has a local scope within the method body. Now if we declare another variable with the same name in the method body, it will result in redefinition of the variable and violate the uniqueness principle of variable names in the method code. This will give rise to syntax error.

8 0
3 years ago
Which of the following best describes the purpose of child labor laws?
BabaBlast [244]

Answer:

Are there supposed to be answer choices with this question?

Child labor laws are basically laws placing restrictions and regulations on the work of minors.

6 0
3 years ago
Read 2 more answers
Why coaxial cable is called coaxial cable?
lyudmila [28]

Answer: Coaxial Cable got its name as "coaxial cable" as it has two physical layer of channel in same cable axis.

Explanation: Coaxial cable is the cable that is basically composed of copper and shield of other materials.They have two physical channels and having a insulating layer between them and the outer layer serving as the ground layer. Both the channel of physical layer have the same axis that why it is termed as "coaxial".These cables are commonly used in the cable televisions , sometimes in telephone line etc.

3 0
3 years ago
What Active Directory object enables an administrator to configure password settings for users or groups that are different from
e-lub [12.9K]

Answer:

Password Settings object

Explanation:

Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.

In AD, the data stored are also known as Objects, these objects can be

  1. users or a group that has been given passwords and/or
  2. resources such as computers or printers.
  3. Organizational Units (OUs)

The object responsible for handling the configuration of passwords configuration is the Password Settings object.

Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.

8 0
3 years ago
Other questions:
  • Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an
    12·2 answers
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • What’s the most popular operating system
    9·2 answers
  • Write a C program that includes a function of type double called divemaster accepts two double arguments (you must write the div
    15·1 answer
  • The relation LIBRARY records books currently on loan to students. Each book has one ISBN_NO The library has several copies of ea
    14·1 answer
  • Suppose a family has had a house fire in which
    7·2 answers
  • Based on the screenshot below which letter do you select to sort the items in an alphabetical order?
    9·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • 15 _____ 3 = 0 Question 11 options: a) / b) % c) * d) //
    12·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!