1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
15

What is the most popular social networking service to date?

Computers and Technology
2 answers:
Fofino [41]3 years ago
6 0
I think Face book hope that helped XD
lara [203]3 years ago
4 0
Its face book

hope this helps
You might be interested in
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
Remember not to use tools that are ________ in any way.
kupik [55]
Remember not to use tools that are rusty and damaged in any way.
3 0
3 years ago
What do you call the number that is used as an index to pinpoint a specific element within an array?
Pie

Answer:

d. subscript

Explanation:

Although I believe "index" is a better term. The question already says it!

5 0
4 years ago
Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
olchik [2.2K]

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
3 0
3 years ago
How can I cancel my subscription I try to go to my account setting and the only thing that pops up is terms of use and change co
Sati [7]

If the only trying that appears is terms of use and change country, that means you are a free user and not a paying subscriber.

So there is no actual subscription to cancel.

If you were a paying subscriber, there would be a cancel subscription option within your account settings.

8 0
3 years ago
Other questions:
  • Which step can most directly help your team follow up on decisions made during Web development meetings?This task contains the r
    6·1 answer
  • Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the
    7·1 answer
  • A malicious program that can replicate and spread from computer to computer?
    10·2 answers
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • What happens when you leave a tablet charging for two days?
    13·1 answer
  • What tag is used to contain information about a web page, such as the title and related pages?
    12·1 answer
  • How to unblock a website on a school computer? ASAP who's ever works will get Brainliest and will get a follow.
    14·2 answers
  • The four main disabilities or impairments that computers can modify are for
    9·1 answer
  • What defines the scope of a project?
    5·1 answer
  • Suppose that you want to write a program that inputs customer data including name, zipCode, balance, and regionNum. At the end o
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!