1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
12

Which type of electronic community is Usenet?

Computers and Technology
2 answers:
Eddi Din [679]3 years ago
8 0
Usenet is a collection of newsreaders and news servers, the modern version of a BBS. The Usenet community is best described as a bulletin board system. This is th<span>e first type of electronic communities in which members subscribed to a centralized provider to distribute information</span>
suter [353]3 years ago
7 0
<span>Newsgroup
 should be the answer</span>
You might be interested in
what is the software that controls the storage, retrieval and manipulation of database stored in a database
irga5000 [103]
A database management system (DBMS) is the software which controls the storage, retrieval, deletion, security, and integrity of data within a database.
5 0
3 years ago
A _________ is the broadcast of various types of media over the web.
Dmitry [639]
News Report.
I hope this helps! :)
4 0
4 years ago
Read 2 more answers
Knowledge and experience help you
Zarrin [17]

Answer:

yes it can it shows u what you did wrong or what you did right

Explanation:

brainlet me please

8 0
3 years ago
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
Which statement best describes top-down programming design?
MariettaO [177]

B is the answer (i think)

5 0
4 years ago
Other questions:
  • David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?
    9·2 answers
  • Which of the following is a benefit, as well as a risk, associated with client/server networks?
    14·1 answer
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • If x window system is installed, linux users can use x11 forwarding to run __________ as they would on a windows computer. gui a
    11·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • How do you optimize a website using JavaScript?
    10·1 answer
  • True/False: not is evaluated first; and is evaluated next; or is evaluated last.
    13·1 answer
  • Cuales son las funcione basica de la computadora​
    9·1 answer
  • Need help coding this it uses input and I need to use the words good and morning
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!