1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
8

Which of these networks is primarily for posting and viewing photos?

Computers and Technology
2 answers:
tigry1 [53]3 years ago
7 0

Answer:C. Flickr

Flickr is an American image hosting and video hosting service, as well as an online community. It was created by Ludicorp in 2004 and has been popular with hosting high resolution photos by amateur and professional photographers.

Flickr is a popular photo-sharing and hosting service with advanced and powerful features. It supports an active and engaged community where people share and explore each other's photos. You can share and host hundreds of your own pictures on Flickr without paying a dime

<em><u>plz mark brainliest</u></em>

Bogdan [553]3 years ago
6 0

Answer:

Flickr

Explanation:

You might be interested in
Compare and contrast hardware and software.
lesya692 [45]
Hardware:
-physical parts of a computer that cause processing of data
-can be connected (physically) & can touch
- Hardware wares out during/over time
-Hardware failure is random
Software:
-A set of construction that tells a computer exactly what to do
-software is logical in nature
- dose not have an increasing failure rate

Similarities
- Behavior; Users interact with the products in various ways

- Products produce outputs and given inputs

-they have functional (user facing) and non functional (non user facing) requirements

-They are both complex (any representation of product specifications lead to a main structure)


Differences
- Software is easier to change then hardware

- Software testing is done by specialized quality assurance (QA) engineers, while hardware is done by engineers who are creating the product

-Hardware must be designed and tested to work over a range of time and environmental conditions, which is not the case for software

- Hardware designs are constrained by the need to incorporate standard parts

(Hope this helps?)
7 0
1 year ago
Read 2 more answers
HELP PLS QUICK TRUE OR FALSE QUESTION
dmitriy555 [2]

Answer: I think the answer is true but I don't fully understand it sorry if im wrong.

Explanation:

8 0
2 years ago
Read 2 more answers
Write an application that allows a user to enter the names and birth dates of up to 10 friends. Continue to prompt the user for
mylen [45]
Sorry I don’t know the answer I am really sorry
5 0
3 years ago
A company that designs video games has decided to expand and needs to hire Software Developers, Web Administrators, and Computer
choli [55]
Collage graduates that are currently jobless or looking to apply for a jod
8 0
2 years ago
Read 2 more answers
____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve
pav-90 [236]

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

7 0
3 years ago
Other questions:
  • What is computer virus?
    8·1 answer
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • to prevent long page load time for pages containing images. It is best to use a compress file formatlike jpeg as well as appropr
    6·2 answers
  • 11. John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the follow
    14·1 answer
  • The INC and Dec instruction do not effect the__________ flag
    6·1 answer
  • A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
    9·1 answer
  • IPhone + iPad + iPod + iPod touch + iMac + MacBook + iBook + Apple =???
    11·2 answers
  • How do optical discs store data? select one:
    15·1 answer
  • What happens to a data table when the formulas or variables used to create it are changed?
    9·2 answers
  • The process of getting listing information displayed on numerous other websites is:________
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!