1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
15

What is blogging

Computers and Technology
2 answers:
kramer3 years ago
7 0
Coming from a blogger and sociologist, I can tell you it's "A. Online Journaling"
tester [92]3 years ago
5 0
Typically, blogging is online journaling. If you've seen Ask Me Why, she blogs throughout the whole movie and tells those who are watching her blog what is happening in her life. So, the answer is A.
You might be interested in
Who can pick up GPS signals
bazaltina [42]

Devices such as TomTom GPS and Garmin GPS pick up a GPS signal


I hope that's help !

5 0
3 years ago
More a poster appealing people to be aware <br>against bullying​
Leya [2.2K]

Answer:

Cool

Explanation:

5 0
3 years ago
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
GPS consists of three segments. What are these segments?
lawyer [7]

Answer the answer is he Global Positioning System (GPS) is a U.S.-owned utility that provides users with positioning, navigation, and timing (PNT) services. This system consists of three segments: the space segment, the control segment, and the user segment. The U.S. Space Force develops, maintains, and operates the space and control segments.

Explanation:

7 0
2 years ago
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at
spayn [35]

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

8 0
3 years ago
Other questions:
  • Mm
    10·1 answer
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • Which of the following CANNOT be done in Normal view A. Enter bolded text in the Notes Pane B. Delete previously entered notes i
    8·1 answer
  • Write a program that declares a constant named QUARTS_IN_GALLON which holds the number of quarts in a gallon (4). Also declare a
    8·1 answer
  • Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer. Assume t
    14·1 answer
  • To combine concepts or ideas into a whole is called
    11·2 answers
  • Create a query that shows columns employee last name, job title and hire date for those employees who joined the company on or a
    7·1 answer
  • Who was the father of computer?????​
    11·2 answers
  • Which operating system might cause the desktop background to change unexpectedly?
    7·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!