1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
13

Jonathan wants to create an online journal. He will use it to share with his friends all the cool places he visits while in Euro

pe. Which social networking tool should Jonathan use to create a journal while on his trip?
a: email
b: a blog
c: a wiki
d: a forum
Computers and Technology
2 answers:
nirvana33 [79]3 years ago
7 0

Answer:

a blog

Explanation:

a forum is for questions, a wiki doesn't make sense in this situation and email wouldn't be used for this either so it should be a blog

mihalych1998 [28]3 years ago
5 0
The correct answer is b I hope this helps luv
You might be interested in
thick is incorrect does anybody know the correct answer? please don’t send any files i can’t open them
77julia77 [94]

Answer:

i think its new

Explanation:

if this is incorrect i apologize

7 0
3 years ago
Which are ways action buttons can be used in presentations?
Luda [366]
You could Do Ctrl + F5 to present your google slides

You could Animate Objects/Units by one of the drop down menus in google slides

You could add a link by copying the link you want to put in by highlighting the link, pressing Ctrl + C (to copy) and Find where you would like to place it and press Ctrl + V
(To Paste)

If you press on a google slide and do not do anything else, at the top it should say theme Or background, there you could select a image from your device or a solid color or Gradient of a color for your background.
6 0
2 years ago
Read 2 more answers
When scanning the road, glance away from the road ahead for ___. A. At least one second B. No more than one second C. At least t
Marrrta [24]
A.At least one second
5 0
2 years ago
Which of the following is a Reach Key on your keyboard?
zhannawk [14.2K]

Answer:J key

Explanation:I want my brainlyiest pls

6 0
2 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Other questions:
  • Which type of object is used to organize and store data in Microsoft access 2013
    5·2 answers
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • Write a setInterval() function that increases the count by 1 and displays the new count in counterElement every 300 milliseconds
    12·1 answer
  • Were Al Zink’s actions that of someone trying to be an invisible Sponsor
    14·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
    14·1 answer
  • Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
    11·1 answer
  • What is a simulation?
    5·2 answers
  • Re:
    15·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!