1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
5

Interactive sites where users write about personal topics and comment to a threaded discussion is

Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
6 0
Social media? is that what you were looking for?
You might be interested in
What does a for loop look for in the sequence of data? Check all that apply.
ValentinkaMS [17]

Answer:

All

Explanation:

Not sure on the context of this question, but a loop is generally used to iterate though every piece of data to perform some kind of operation, on everything in something like an array or string.

7 0
2 years ago
Read 2 more answers
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
What is the best Graphics Card you can get in a Gaming Computer? Also what is the RAM do in a Comptuer
saveliy_v [14]

Answer:

For Simple AAA. title games you can get a gtx 1050 ti which can run games decent about 60 fps on med to low settings i my self am running a r7 370 and i play FiveM at 40 fps or gta5 at 60 csgo at 120 fps if you want to go higher go with the best graphics and fps go with something cheap but extreme a RTX 2070 or 2080 and with ram it help the computer run smoother basically imagin what a plate is ram so more plates you have the more food you can store in it untill someone (the computer) uses it all its a quick storage for limited time the more the better usually for gaming a 16gb should be enough

Explanation:

5 0
3 years ago
This is for C++: Using a nested for loop output the following pattern to the screen:
olga55 [171]

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

int r=26,x,y;//defining integer variable  

char c;//defining a character variable

for(x= 1; y<= r; x++)//using for loop for count value

{

for(y= 1; y<= x; y++)//using for loop to convert value in triangle  

{

c=(char)(y+64);//convert value into character  

cout << c;//print character value

}

cout << "\n";//use print method for line break

}

return 0;

}

Output:

Please find the attachment file.

Explanation:

In this code, three integer variable "x,y, and r", and one character variable "c" is declared, that is used in the nested for loop,  in the first for loop it counts the character value and in the next for loop, it converts the value into a triangle and uses the char variable to print its character value.

3 0
2 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
2 years ago
Other questions:
  • Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does
    12·1 answer
  • What type of program would use to create a personal budget?
    14·1 answer
  • What list did poe appear on for the search engine lycos?
    11·1 answer
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • knowledge contributes vitally to the development of __________ memory, or recollections of personally experienced events that oc
    12·1 answer
  • An organization's Finance Director is convinced special malware is responsible for targeting and infecting the finance departmen
    13·1 answer
  • What are examples of templates the Input Mask Wizard offers? Check all that apply.
    12·2 answers
  • What are specific and relevant terms that will help you locate information using an internet search engine?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!