1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
2 years ago
15

The Twitter website has become a de facto first source for many important events in the last decade. Twitter's hashtag feature l

ets users tag tweets with single words or phrases (e.G. #superbowl, #algorithms, or #vacaciones). Popular or trending hashtags indicate strong shared interest by many people in a topic, and tracking these trends is of interest to businesses, news outlets, and researchers.
Computers and Technology
2 answers:
sergij07 [2.7K]2 years ago
8 0

Answer:

I am not sure what this question is trying to ask, but this question sounds interesting.

Hash tags were created by Chris Messina in 2007 #twitter

timurjin [86]2 years ago
7 0

Answer:

..........................................?

You might be interested in
_________________ component defines the correct granularity for access controls and oversees the relationships between identitie
Otrada [13]

Answer:

<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

8 0
2 years ago
Write a while loop that prints 1 to user_num. Sample output for the given program: 1 2 3 4
Scorpion4ik [409]
Given 1234
i=1
user num=4#assume positive
while (user-num>=i);
print(i)
i+=1
#include <iostream>
using namespace std;
int main()
{int userNum=0;
int i=0;
userNum=4; ##assume positive
i=1;
while (i <=userNum){
cout<<i>>" ";
i=i+1;
cout <<endl;
return0;
}
6 0
3 years ago
Read 2 more answers
If you think a query is misspelled, which of the following should you do? Select all that apply.
Alik [6]

Answer:

The answer is: letter C, For obviously misspelled queries, base the utility rating on user intent.

Explanation:

The question above is related to the job of a "Search Quality Rater." There are several guidelines which the rater needs to consider in evaluating users' queries. One of these is the "User's Intent." T<u>his refers to the goal of the user. </u>A user will type something in the search engine because he is trying to look for something.

In the event that the user "obviously" misspelled queries, the rate should be based on his intent. It should never be based on why the query was misspelled or how it was spelled. So, no matter what the query looks like, you should assume that the user is, indeed, searching for something.

Rating the query will depend upon <u>how relevant or useful it is and whether it is off topic. </u>

4 0
3 years ago
Read 2 more answers
Using an API means that games take a performance hit, but are able to render more CPU intensive graphics.
Sergio [31]
Yes that is correct. Was there a specific question you wanted answered...
7 0
3 years ago
Read 2 more answers
What are some of the challenges that could arise from setting up a file management system on a computer
Katarina [22]
<span>You could download some software that could mess up your whole computer.</span>
3 0
3 years ago
Other questions:
  • Which are characteristics of pseudocode? Select all that apply.
    6·1 answer
  • Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
    12·1 answer
  • What was the first carbonated drink to be introduced in the US?
    6·1 answer
  • Who is the CEO of Quora?
    15·1 answer
  • Draw a timeline for each of the following scheduling algorithms. (It may be helpful to first compute a start and finish time for
    9·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • How do i make a PDF and what is a PDF<br><br> sorry i am dumb
    14·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!