1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
4 years ago
9

Research: "How was your experience on site '4chan'?" Please answer in the box below.

Computers and Technology
1 answer:
olganol [36]4 years ago
5 0

Answer:

My experience was comfortable

Explanation:

This website is pretty simple and loads fast, there are a lot of images with high quality but only when you click over of the image this expands in the original size.

I could find really helpful information, there are different subjects, but this is not a website for kids for some adult content.

I didn't need to register any information to share content or if you want to ask something and everything is anonymous.

You might be interested in
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
4 years ago
Identifiy the impact of new technology for your organizations <br>​
Len [333]

Answer:

1)The Sleepwalker Effect. This effect has several dimensions. ...

2)The Transparency Effect. ...

3)The Black Box Effect. ...

4)The Splintering Effect.

7 0
2 years ago
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
3 years ago
) What does sampling mean?
lubasha [3.4K]
In terms of music taking one song and incorporating it into your own song
6 0
3 years ago
Suppose you have data that should not be lost on disk failure, and the application is write-intensive. How would you store the d
natita [175]

Answer:

use RAID 5

Explanation:

The best option in this scenario would be to use RAID 5, this would all but eliminate the risk of losing the data. As you would need at atleast 3 seperate drives which would all act as backups for each other. Therefore, in the unlikely case that one of the drives were to fail or data were to become corrupt/lost the other drives would have a backup of that data which ca be used.

7 0
3 years ago
Other questions:
  • On the 74ls74 d flip-flop, the clk input has a small triangle. the pr (preset) and clr (clear) inputs have a circle. what do the
    15·1 answer
  • Motivation is best defined as
    9·2 answers
  • Consider an environment in which there is a one-to-one mapping between user-level threads and kernel-level threads that allows o
    7·1 answer
  • Question :
    6·1 answer
  • What is the web page path on the web server for the URL:
    12·1 answer
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • Explain the concepts of GIGO—garbage in, garbage out. Why do you think it’s a helpful concept in coding? How do you think it can
    8·1 answer
  • Which sentence describe internet safety precautions?
    5·1 answer
  • Which original VPN protocol is supported by most platforms but offers low levels of security?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!