1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
13

Jonathan wants to create an online journal. He will use it to share with his friends all the cool places he visits while in Euro

pe. Which social networking tool should Jonathan use to create a journal while on his trip?
a: email
b: a blog
c: a wiki
d: a forum
Computers and Technology
2 answers:
nirvana33 [79]3 years ago
7 0

Answer:

a blog

Explanation:

a forum is for questions, a wiki doesn't make sense in this situation and email wouldn't be used for this either so it should be a blog

mihalych1998 [28]3 years ago
5 0
The correct answer is b I hope this helps luv
You might be interested in
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
Write a program to change background colour of your visual basic form with any 3 different events.​
Stels [109]

Answer:

To change the background color, select the form in Visual Studio and locate the BackColor property in the Properties panel. There are a number of ways to specify a color. Color by name - Simply type in a color name into the BackColor value field (for example Red, Yellow, Cyan etc).

Explanation:

4 0
3 years ago
Read 2 more answers
A variable that can have values only in the range 0 to 65535 is a :
Thepotemich [5.8K]

Answer:

a.

Explanation:

Two bytes have 2 times 8 bits is 16 bits.

Max value that can be expressed is 2¹⁶-1 = 65535

6 0
3 years ago
Compute the sum of all integers that are multiples of 9, from 1 to 250. Enter your result of your computation in the text box be
shepuryov [24]

The pseudocode to find the sum of all integers that are multiples of 9, from 1 to 250.

totalSum = 0

for i from 1 to 250{

     if i is divided by 9 and remainder is 0{

           totalSum  = totalSum + i;

     }

}

print(totalSum)


in python language the code will be

totalSum = 0

for i in range(1,250):

    if i%9==0:

       totalSum += i



If you will run the program , the answer would be 3402.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Credibility means that the reader perceives value in what you write.<br> True False
    12·1 answer
  • Remember to save _____ and be certain that you have your files saved before closing out.
    11·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • Two samples of dirt are collected from a suspect's tread in his shoe and a crime scene. The forensic investigator does a gross e
    6·2 answers
  • According to the video, some workers who work for themselves, such as Actors, Musicians, or Writers, may have what sort of worke
    7·1 answer
  • State the difference between = and ==
    9·1 answer
  • What is the function of a breadcrumb trail in a website ?
    10·2 answers
  • 2. Select the things you can do when working with rows in columns in a spreadsheet:
    5·1 answer
  • If the old and new systems are operated side by side until the new system has proven itself, this type of system conversion plan
    11·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!