1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
5

Compare entertainment applications to social media applications.

Computers and Technology
2 answers:
Pachacha [2.7K]3 years ago
8 0

Answer:

Both allow users to stay current with the latest information ( A )

Explanation:

Entertainment applications and social media applications are applications used to interact and share ideas about the entertainment world.

Entertainment apps gives information or talks about entertainment activities both previous,current and upcoming events

While social media apps can be used to chat and share personal  information between users on social media and also to get information on the latest happening around the world .

The similarity between entertainment and social media applications is access to latest information.

ladessa [460]3 years ago
4 0
A. both allow user to stay current with the latest information.
You might be interested in
For a web application we associate a web server, for a mobile application we associate a mobile server. for a decentralized appl
Alex_Xolod [135]

For a decentralized software application we associate a blockchain server.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server
  • Distributed communication server
  • Centralized Server
  • Distributed application server
  • Blockchain server

Generally, a web software application is associated with a web server, a mobile software application is associated with a mobile server, and a decentralized software application we associate a blockchain server.

Read more on web server here: brainly.com/question/27960093

#SPJ1

7 0
2 years ago
When should you create an outline?
liraira [26]

Answer:custom slide show

Explanation:

5 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
Which of the following statements are true of
Gennadij [26K]

Answer:

Option A - They are responsible for writing programming

Option B - They are usually strong problem-solvers

Explanation:

A software engineer needs to be a strong problem solver and he/she must be able to write program/code. He/She is not required to conduct experiments in labs and also it is not essential for them to hold masters degree as even the non computer science or IT background people are working as software engineer.

Hence, both option A and B are correct

8 0
3 years ago
What would happen if your computer was infected with the virus or if your network went down?
tatuchka [14]

Your computer will programs more slowly, when you go to an anti-virus software, for some, it will block you from allowing you to access the application. Your information may be stripped from your computer, allowing the infection to take your personal identity and money.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
    12·1 answer
  • To move to the bottom of a document window, press the ____ key(s). ALT CTRL PAGE DOWN CTRL PAGE DOWN ALT PAGE DOWN PAGE DOWN
    11·1 answer
  • Is there truth? Does truth exists?
    14·2 answers
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • Is a router on the local network that is used to deliver packets to a remote network?
    15·1 answer
  • __________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
    6·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
  • 10.
    15·1 answer
  • Task 2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!