1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
6

Complete the sentence

Computers and Technology
2 answers:
prisoha [69]3 years ago
8 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is: Online community technologies.

So, we can fill this question with the correct option as below:

<u>Online community technologies</u> are technologies that support virtual communities and the sharing of content with friends and family.

As we know that online community technologies are those technologies where people of the same group or interest make community virtually online. Where they can share their contents such as pictures, videos, thaught, ideas, etc with the group or family members.

There are different technologies that support virtual communities to share content with friends and family.

Such as Zoom meetings, Sk ype, Face book, Insta gram etc.

gavmur [86]3 years ago
6 0

Answer:

Taking the quiz rn and I put social media

Explanation:

Social media is the closest description to this however it may be collaborative tools if it’s not social media.

You might be interested in
According to the Big Five Factors model, all but _____ are categories.
STatiana [176]
The Big Five Factors are: "Open, Agreeable, Stable, Conscientious, and Extraverted"

"Empathetic" is not one of the Big Five Factors.

<span>According to the Big Five Factors model, all but empathetic are categories.</span>
4 0
4 years ago
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o
In-s [12.5K]

Answer:

False.

Explanation:

Administrators showing caution in using the same tools that are used by the attackers remember that tool that can help to close a poorly configured or open firewall will help network defender and it will minimize the risk from the attack.

Hence the answer to this question is false.

6 0
3 years ago
Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
masya89 [10]

Answer:

D. Tests that run too long risk slowing down the feedback cycle for developers

Explanation:

The reason you should run your unit test suites not to take a long time is that "Tests that run too long risk slowing down the feedback cycle for developers."

Otherwise, the developers would find it difficult to detect problems instantly, causing delay to fix the problems which will eventually delay the developers or project's team to advance to the next stage of the project.

3 0
3 years ago
What is the analysis and complexity of a shell sortalgorithms?
Llana [10]

Answer: The shell sort is based on insertion sort. Here the list of elements are divided into smaller sub list which are sorted based on insertion sort.

Its best case time complexity is O(n* logn) and worst case is O(n* log^2 n)

Explanation:

Shell sort is an inplace sorting here we begin by dividing the list into sublist and sorting the list with insertion sort. We create interval for dividing the list into sub list until we reach the smallest interval of 1.

The best case is O(n* logn).

6 0
3 years ago
DIMM is a type of which component? <br> 1.CPU<br> 2.RAM<br> 3.expansion slot<br> 4.chipset
gulaghasi [49]

Answer:

2.RAM

Explanation:

BECAUSE IT CAN BE EASILY VIRIFIED ON THE INTERNET

7 0
3 years ago
Other questions:
  • Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
    5·1 answer
  • ________ are websites that provide collections of content from all over the world wide web a. aggregators b. social networks c.
    6·1 answer
  • Your co-worker is at a conference in another state. She requests that you
    9·1 answer
  • Had you guys go to prom by yourself or someone in your senior class
    5·2 answers
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • How to bold words in microsoft word
    10·1 answer
  • Which statement best describes the difference between a spreadsheet and a database?
    9·2 answers
  • The point of (18 ,0) lies on​
    15·2 answers
  • What is your definition of Digital Safety?
    6·1 answer
  • In the world of computer languages, whats the most popular language?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!