1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
5

One author states that Web-based software is more likely to take advantage of social networking (Web 2.0) approaches such as wik

is and blogs. If this is the case, can we expect more social networking capabilities in all future software? Aside from LinkedIn, how can social media be leveraged by CIT graduates?
Computers and Technology
1 answer:
kodGreya [7K]3 years ago
6 0

Answer:

Yes

Explanation:

I will say Yes. There are very much limitless possible and future we can expect from social media and even more from social networking. Its capabilities from upcoming software in the future. Since the Internet is in its early days of growing and cloud computing being introduced there are way more possibilities in the future.

Social media can be duely applied by CIT (Computer Information Technologies) graduates. It can be used to improve them in their career and also will helps them connect professionally. Quora is one such platform which is not exactly like LinkedIn but pretty much serves the purpose.

You might be interested in
Describe the different
____ [38]

Answer:

left thinks about girls and right is school

Explanation:

yes

8 0
2 years ago
Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
olchik [2.2K]

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
3 0
3 years ago
To make changes to how UAC operates, you must be logged in as administrator true or false
Nady [450]

Answer:TRue

Explanation:

Is true because when u Operate with WAC than u need to be logged in as administrator

4 0
3 years ago
Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
zloy xaker [14]

Answer:

area = 2.14 * 3 ** 2

Explanation:

No clue what language you use but this should be pretty universal. To find the area of a circle you use pi(r) ^ 2 or pi times radius squared

\pi r^{2}

In python it looks like this:

>>> area = 3.14 * 3 ** 2

>>> print(area)

28.26<em> <Printed text</em>

3 0
2 years ago
Which of the following is considered both an input and output peripheral? Keyboard, Microphone, Speaker, Touchscreen monitor
Aleks04 [339]
Touchscreen monitor.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Playville is a tiny town in fictional middle earth, which is inhabited by dwarves and elves. Playville has a playground to which
    6·1 answer
  • What is one example of technology influencing health​
    9·1 answer
  • Odbc works on the ____ operating system.
    5·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • In which job role would a course in 3D modeling help with professional career prospects?
    9·2 answers
  • Difference between positional and non positional number​
    12·1 answer
  • Any material that comes into contact with the body must be __________.
    6·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • How are online sources used? Check all that apply.
    8·2 answers
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!