1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
9

A _______ is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.

Computers and Technology
2 answers:
Bezzdna [24]3 years ago
5 0

Answer:

A wiki is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.

Explanation:

Lesechka [4]3 years ago
3 0

Answer:

"Wiki" Blog Webcast Microblog

so technically just wiki

Explanation:

A Wiki Blog Webcast Microblog is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.

You might be interested in
Highlights the possible risks and problems that should be addressed during the implementation process
Llana [10]

Answer:

The answer is below

Explanation:

Since the type of Implementation is not stated specifically, it is believed that, the question is talking about ERP Implementation, because it is related to subject in which the question is asked.

Hence, Enterprise Resource Planning (ERP) implementation deals basically, by carrying out installation of the software, transferring of finanancial data over to the new system, configuring application users and processes, and training users on the software

ERP Implementation Risks involve the following:

1. Inefficient Management and Project Activities.

2. Inadequate or No Training and Retraining of Customers or End-Users.

3. Inability to Redesign Business Processes to meet the Software requirements.

3. Incompetent or lack of Technical Support Team and Infrastructure.

4. Incapability to Obtain Full-Time Commitment of Employee.

5. Failure to Recruit and Maintained Qualified Systems, and Developers.

6 0
4 years ago
What is the device that converts the signals to and from the wires so that the data can be sent and received by the computer?
netineya [11]

Answer:

E. Modem

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

In order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

In Computer Networking, a node is the physical device that make up a network and are capable of sending, receiving, creating and storing data in communication.

Examples of network nodes are routers, hubs, computer, switches, smartphone, printers, modem, etc.

A modem is a networking device that converts the signals to and from the wires such as a telephone line, so that the data can be sent and received by the computer.

Basically, a modem is an abbreviation for modulator and demodulator and as such it is designed to convert signal from one network device to signals that another network device such as a computer can understand or read.

When sending a signal (data) over a network, a modem converts (modulate) digital data signal to an analogue signal and transmits it over a telephone line or other communication lines. Also, when receiving an analogue signal, a modem converts (demodulate) the signal to a digital data signal.

8 0
3 years ago
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and sp
defon

Answer:

The correct answer is C "Computer Virus"

Explanation:

Computer virus is a piece of code that install itself in a computer without the knowledge and permission of the user and start replicating itself and as it execute it self also start damaging the computer files.

Computer virus have ability to replicate itself and it attached to files and move from one computer to another with these files when files are transferred.

5 0
4 years ago
Select all True statements! Question 1 options: a) Host A is sending Host B a large file over a TCP connection. Assume Host B ha
VikaD [51]

<u>Solution:</u>

a)   False. Piggyback is used only for efficiency. If there's no data packet to be piggybacked to, then B will just send the acknowledgement packet.

b)  False. It is the size of the receiver's buffer that's never changed. RcvWindow is the part of the receiver's buffer that's changing all the time depending on the processing capability at the receiver's side and the network traffic.

c)  The given statement is True.

 d) False. The sequence number of the subsequent segment depends on the number of 8-byte characters in the current segment.

e)  True. Every TCP segment has a current value of rwnd in the receive window.

f)  False. Next_RTT = alpha * last_estimated_RTT + (1-alpha)*newly_collected_RTT_sample. In this case even though the last sampleRTT which is the newly_collected_RTT_sample is 1sec, the next_RTT still depends on alpha and last_estimated_RTT. Therefore, the next_RTT is not necessarily greater than 1sec.

g) False. The acknowledgement number has nothing to do with the sequence number. The ack. number indicates the next sequence number A is expecting from B.

5 0
4 years ago
Assume that an Internet service provider (ISP) intentionally disclosed the contents of a lawful private e-mail message without c
Alexus [3.1K]

Answer:

Electronic Communications Privacy Act of 1986

Explanation:

<em>Electronic communications</em> involve the transfer of data, sounds, images, writing, signals, signs or any form of intelligence radio wire or any other means.

The Electronic Communication Privacy Act of 1986 (ECPA) was passed into law by the US Congress to further restrict inappropriate wiretaps of electronic data or telephone calls and also, prohibit access to stored electronic communications. They further added pen-trap provisions that allow the tracing of communications over the telephone.

All these were put in place to primarily prevent unauthorized access to government communications.

If an Internet Service Provider (ISP) intentionally discloses the content of a lawful private email message without consent, they have violated the Electronic communication Privacy Act of 1986 (ECPA).

4 0
3 years ago
Other questions:
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • Assume that the main method of the class named Welcome does not contain any compile-time errors. What is the name of the file ge
    11·1 answer
  • Which of the following indicates what a reply to all function does in most email programs
    8·1 answer
  • Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
    10·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers
    7·1 answer
  • How can you have a safe browsing experience?
    10·2 answers
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
  • Pls help
    13·1 answer
  • You are given an integer N where 0 &lt;= N &lt;= 100, followed by another line of input which has a word W with length L where 1
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!