1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
8

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
8 0

Answer:

Suzanne needs a blog

Explanation:

Because she wants to use a digital media tool that acts as a journal and facilitates discussion, Suzanne would need a blog for this.

A blog is a platform where people can meet and have discussions on the internet sometimes in a diary-like format.

Suzanne would need software like WordPress for her blog.

You might be interested in
While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
Natasha_Volkova [10]
True because any one can change or fix their voice just by practicing a voice.
3 0
3 years ago
Tạo biến
rewona [7]

Answer:

WHERE ARE YOU FROM

Explanation:

TRANSLATE IT TO ENGLISH

5 0
3 years ago
Which option ensures that a page break is automatically inserted ahead of a specific paragraph or heading?
gulaghasi [49]

The correct answer is option D, the last one! <3

6 0
3 years ago
Read 2 more answers
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
3 years ago
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Tower defense is included under which genre of game
    15·2 answers
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
    7·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • WILL DO A BRIANLY! Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands be
    12·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • Plot element is typically the turning point in the most intense moment of a story
    8·1 answer
  • What is a device driver​
    13·2 answers
  • If a citation has a volume, title, and page numbers, it is a:
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!