1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
6

If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us

ing a(n) _______.
A. Wiki application
B. Twitter account
C. Blog window
D. Facebook account
Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
7 0
A Wiki application. Wikipedi.a (or any Wiki, for that matter), can be added to, modified or deleted by anyone who visits the site; it is a collaborative contribution.

A Twitter account, blog window, and a Facebook account, all require a secure password that only you would know. So unless you got hacked or something, what you have described would not apply to these three.
You might be interested in
What exactly does the value recorded in a single dimension of a sift keypoint descriptor signify?
mash [69]
SIFT image features provide a set of features of an object that are not affected by many of the complications experienced in other methods, such as object scaling and rotation.
5 0
4 years ago
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
Serjik [45]

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

4 0
3 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
4 years ago
This is a legitimate question if you have a problem then just ignore it. What is the difference between CRVM and SAPX in a progr
g100num [7]

Answer: SAPX is used with Java

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following is a good way to improve your credit score?
Ganezh [65]
The answer is chope this helps
6 0
3 years ago
Other questions:
  • To select all the text in a document, press ____.
    12·2 answers
  • How should students approach the decision to take the SAT or the ACT?
    6·1 answer
  • Can you make copies of classified documents provided you alert others?
    6·1 answer
  • Create the SQL statements for displaying the results for each of the following scenarios in the Academic Database. Save these st
    13·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • Initialized the variable with the value 0
    11·2 answers
  • Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the
    5·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
  • Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Quest
    14·1 answer
  • What are the importance of computer software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!