1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
4 years ago
5

Blogs differ from most other online text sources because they

Computers and Technology
2 answers:
allochka39001 [22]4 years ago
4 0
Tell you what a person's life is like
Art [367]4 years ago
3 0
A blog is mainly about a person's life, and can also be about different things as well. 
You might be interested in
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
Shaniya has misspelled a scientific name in her biology report. She needs to correct it, but she has no access to a computer. Sh
Brums [2.3K]

yes, she can make an account or log onto her school account

7 0
3 years ago
Read 2 more answers
Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare.
egoroff_w [7]

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

4 0
3 years ago
A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchr
erastovalidia [21]

Answer:

The answer is "10101010".  

Explanation:

Description of the above question as follows:

  • Encryption with Manchester is a bit transmission method that makes synchronizing the receiver with the sender simple.
  • It splits each bit time frame into two, ensuring that the signal levels are always transient in the middle of each bit.
  • The encoding of Manchester explains the first byte of the frequency signal pattern, which produced in the preambles which are given in the attachment.

6 0
3 years ago
Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
MariettaO [177]

Answer:

a. Report the new problem

Explanation:

Policies are an essential component of any organization and are important because they address pertinent issues.

Reporting the new problem would make it simpler for her and her colleagues who might encounter similar issues. It would also help the management to understand why it happened, assist her, set priorities and prevent recurrences.

3 0
4 years ago
Other questions:
  • A document repository is down when you attempt to access it. which isa principle is being violated?
    13·1 answer
  • What is difference between RAM and ROM?
    13·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • An administrative assistant types a document, saves, and prints. The assistant is using _____.
    13·1 answer
  • How would you describe the relationship between blocks of code and commands?<br>HELP​
    10·1 answer
  • How do you program a computer
    7·1 answer
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Can rank u r guys in rocket leagye
    13·1 answer
  • How does an Ac Machine work
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!