1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
6

Complete the sentence

Computers and Technology
2 answers:
prisoha [69]3 years ago
8 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is: Online community technologies.

So, we can fill this question with the correct option as below:

<u>Online community technologies</u> are technologies that support virtual communities and the sharing of content with friends and family.

As we know that online community technologies are those technologies where people of the same group or interest make community virtually online. Where they can share their contents such as pictures, videos, thaught, ideas, etc with the group or family members.

There are different technologies that support virtual communities to share content with friends and family.

Such as Zoom meetings, Sk ype, Face book, Insta gram etc.

gavmur [86]3 years ago
6 0

Answer:

Taking the quiz rn and I put social media

Explanation:

Social media is the closest description to this however it may be collaborative tools if it’s not social media.

You might be interested in
_______ is implemented by identifying inmates who are of particular concern to public safety and by providing those specific off
LekaFEV [45]

Answer:

The answer is "selective incapacitation".

Explanation:

Incapacitation stands for when a person commits his crime. Selective incapacitation is a disciplinary mechanism, that preserves communities and only imprisoning criminals, who pose the biggest threat to society.  

  • The danger is related to the quality and variety of offenses and the risk of re-infraction. It stops the significant number of crimes, even low-end tests say.  
  • The most economical disability approach will require more narrowly the redistribution of penal services by defining the most violent offender selective incapacitation.  

6 0
3 years ago
Write the declaration statement for a two-dimensional array X of integers with five rows and five columns that accepts 25 intege
madreJ [45]

Answer:

int[ ][ ] X = new int[5][5];

It can also be declared and initialized this way:

  int[][] X = {

               {1,2,3,6,8},

               {4, 5, 6, 9},

               {7,5,6,8,9},

               {8,5,8,8,9},

               {10,2,6,8,11},

       };

Explanation:

Above is a declaration of a two-dimensional array that can hold 5*5=25 int values. A java program is given below:

public class JavaTwoD{

   public static void main(String args[ ]) {

       // creating the 5X5 array

       int[ ][ ] X = new int[5][5];

       // looping through the array to add elements

       for (int i = 0; i < X.length; i++) {

           for (int j = 0; j < X[i].length; j++) {

               X[i][j] = i * j;

           }

       }

5 0
3 years ago
When saving messages as drafts, it’s important to remember that your draft will not go live unless _______. Choose only ONE best
Nadusha1986 [10]

Answer:

Option (b) is the correct answer.

Explanation:

"Drafts" is a folder of messaging software or mail software whose works are to save the message until the user does not want to send it. So to send the message from drafts, the user needs to edit the message first then he can able to send that message. The above question asks that how a user can send the draft message. Option b suggests that a user needs to click send to send the draft message.

Hence it is a right option while the reason behind the other option is invalid are as follows--

  • Option a suggests that a user needs admin permission to send this but if that is his account then no need for admin permission.
  • Option c suggests to unlock the draft but the draft folder is not locked.
  • Option d suggests to take permission from a superuser but that is not required.
7 0
3 years ago
To add a new guide to the slide press ____________________ and then drag an existing guide
Reptile [31]
To be able to add new guide to the slide, press [Ctrl] and then drag an existing guide. Make sure that the guide is visible to your power point first so you can be able to do this. Guides in the power point is consist of 2 lines, the horizontal line and the vertical lines, once this set to appear, it will be visible to all your slides. <span />
8 0
3 years ago
Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits
Olenka [21]

Answer:

suppose i was i would tell them i dont know and walk away

Explanation:

in thoery this is correct

you said suppose so i answerd

there is no use in reporting or getting this taken down

nether is it right

im not stealing points

Because in thoery its an answer

<em><u>THIS IS MY PROTEST</u></em>

6 0
3 years ago
Other questions:
  • What will be printed when the method printstuff is called?
    7·1 answer
  • How much does 1 American tank cost on gas for a regular mission? Depending on your answer, I will give you the right amount of p
    12·1 answer
  • Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop
    10·1 answer
  • Which of the following internet connection types is known to have a significantly higher latency than the others
    10·1 answer
  • What is the difference between Packaged and tailored soft ware?​
    6·1 answer
  • Which term means the push that makes electrons move in a wire?
    13·2 answers
  • Write an if-else statement that assigns 0 to the variable b if the variable a is less than 10. Otherwise, it should assign 99 to
    6·1 answer
  • Not a subject question but please help
    14·2 answers
  • Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and g
    15·1 answer
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!