1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
3 years ago
10

When Twitter is used to gather a large group for a face-to-face meeting it is called

Computers and Technology
1 answer:
Verdich [7]3 years ago
8 0
The answer is flash mob. They called it flash mob when a large number of people in twitter gather in group for a centralized face to face meeting. In flash mob, people are gathering to be able to create a community that is helping each other or even just talking to each other.
You might be interested in
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
1 year ago
Gwen wants to adjust columns of text that contain money values. Which tab stop option should she choose?
Shtirlitz [24]

Gwen wants to adjust columns of text that contain money values. The tab in excel in the stop option that should she choose is: "The decimal Tab" (Option C)

<h3>

What is the Decimal Tab?</h3>

A Decimal Tab stop is used to align numbers around a decimal point. The decimal point remains in the same location regardless of the amount of digits.

When using this form of tab stop, the numbers must be aligned around a decimal character.

Learn more about excel:
brainly.com/question/25879801
#SPJ1

3 0
1 year ago
A common use of color in a document is in Table Headers. Which of these is NOT a common way to use color in a table header.
Lesechka [4]
<span>Use a dark color with light-color text to contrast the headers with the data.</span>
3 0
3 years ago
Is the hacker group project zorgo real or fake
Charra [1.4K]

It is real I hoped this help you

4 0
3 years ago
Read 2 more answers
Describe how MICR is used to read these details from the cheque​
KatRina [158]

Answer:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

Explanation:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

7 0
3 years ago
Other questions:
  • The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
    5·1 answer
  • What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
    9·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • Which of these statements is true about database reports? A. A generated report will include all records in the database. B. A g
    10·1 answer
  • Instructions The population of town A is less than the population of town B. However, the population of town A is growing faster
    8·1 answer
  • You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
    10·1 answer
  • The bubble sort algorithm sorts using what technique?
    14·1 answer
  • Final one bit l y links are a virus that will corrupt your files do not go on it
    15·2 answers
  • A occurs when you reset a mobile device but retain your installed applications and personal settings
    10·2 answers
  • Which of the following is a table which can be rearranged to analyze data in a variety of ways?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!