1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna1 [17]
4 years ago
15

A chemistry teacher colleague of yours uses video regularly in their courses, but commented to you about how much time it takes

her to find new videos on youtube. knowing a bit about youtube, you suggest that she filter her searches, and suggest that she begin by filtering by _____________ so that she can find groups of videos that are already organized around a theme.
Computers and Technology
2 answers:
IrinaVladis [17]4 years ago
7 0
The chemistry teacher should filter his search by channel so that she can find groups of videos that are already organized around a theme. Channels are organized according to themes or topics of the videos that are uploaded in YouTube. 
Elan Coil [88]4 years ago
5 0
Hello there.
<span>
A chemistry teacher colleague of yours uses video regularly in their courses, but commented to you about how much time it takes her to find new videos on youtube. knowing a bit about youtube, you suggest that she filter her searches, and suggest that she begin by filtering by _____________ so that she can find groups of videos that are already organized around a theme.
</span>
Channels
You might be interested in
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
How do you move a slide to another location in you your<br> presentation?
ludmilkaskok [199]

Answer: Literally click on it and hold, then just drag it to wherever you want it

Explanation: Hope this helped you

5 0
3 years ago
You are designing a Webpage for your company's site that reaches an international audience. What should you do to solve the prob
Helga [31]
It is b cause of its answer
8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Steve is conducting research on the reach of mental health care to the youth. After gathering data on psychologists, he creates
lora16 [44]

Answer:

Descriptive Statistics.

Explanation:

First Steve gathered the data and after that he created the pie chart displaying the percentage of psychologists working in different fields.Here Steve used descriptive statistics to display the data that he collected.

Descriptive statistics are the descriptive coefficients that give the abstract of the data collected.

6 0
3 years ago
Other questions:
  • Which of the following devices electronically sorts mail by ZIP code? A. Fax modem B. Electronic organizer C. Optical character
    10·1 answer
  • Describe the role of a chemist and the role of a chemical engineer
    9·1 answer
  • Are used to connect a computer to a telephone line for dial-up internet access
    5·1 answer
  • What is a good technological design?
    13·1 answer
  • How does limiting a company's scope benefit the company?
    15·2 answers
  • You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the ne
    12·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    8·1 answer
  • Unlike oracle, access does not support the decimal data type.​<br><br> a. true<br><br> b. false
    9·1 answer
  • What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB
    11·1 answer
  • How can goal setting help with academic performance?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!