1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
15

The Twitter website has become a de facto first source for many important events in the last decade. Twitter's hashtag feature l

ets users tag tweets with single words or phrases (e.G. #superbowl, #algorithms, or #vacaciones). Popular or trending hashtags indicate strong shared interest by many people in a topic, and tracking these trends is of interest to businesses, news outlets, and researchers.
Computers and Technology
2 answers:
sergij07 [2.7K]3 years ago
8 0

Answer:

I am not sure what this question is trying to ask, but this question sounds interesting.

Hash tags were created by Chris Messina in 2007 #twitter

timurjin [86]3 years ago
7 0

Answer:

..........................................?

You might be interested in
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
___________ applications help you manage and present mathematical data easily and perfectly.
elixir [45]

Answer:

Spreadsheet

Explanation:

Spreadsheet applications like Microsoft Excel, Google Sheet, etc. makes the task of managing and presenting the mathematical data quite easy and perfect. It consists of rows and columns, and in each cell, we can apply a set of formulas. Its a great data mining tool as well, where the unprocessed data is cleaned, to form a piece of information at various levels, and fed to top management. It helps in all sorts of analysis, and like statistical analysis. And it supports data visualization as well. which makes the analysis even more fruitful and easy. However, its drawback is, the set of variables cannot be more than 3. And that is where the software like Microsoft Power BI and tableau comes into the picture. And they support spreadsheets as well as various other formats.

5 0
3 years ago
first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.
pshichka [43]

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

3 0
3 years ago
Organ transplants are rarely successful.
Maurinko [17]

False......................

6 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
AlexFokin [52]

Answer:

ECC memory

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the best type of RAM for this situation would be ECC memory (RAM). This abbreviation refers to Error-Correcting-Code, this memory can detect and correct many common types of errors, and is used mainly for servers or when sensitive data is involved where errors and data corruption cannot be allowed to happen under any circumstance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
4 years ago
Other questions:
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Whats included in ms office 2013 professional?
    10·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • In 4-bit sign magnitude representation, what is the binary encoding of the number -5?
    15·1 answer
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • What usually happens during the investigation &amp; analysis stage of the Systems Life Cycle
    15·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
  • To use the replace feature we can simply just press Carl+h,Carl+c,Carl+r
    13·1 answer
  • Radio spectrum is the part of the complete range of electromagnetic waves that is used for radio communication from
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!