which windows 7 window can be used to get a report of the history of problems on a computer?

Answers

Answer 1

Answer:

Event viewer

Explanation:

Event Viewer is a application that contains all of the errors from the system and installed applications. although most of the errors can be ignored, you can use the information contained in the application to maybe get some more information on a problem


Related Questions

Which application would be considered a product of IoT?
a) DVD video player
b) real-time traffic information
c) AM radio broadcast
d) topographic maps
Question 2 Which industry sector uses IoT technologies to deploy smart grids?
a) manufacturing
b) energy
c) emergency services
d) transportation

Answers

An application that would be considered a product of IoT is b) real-time traffic information.

The b) energy sector uses IoT technologies to deploy smart grids which are power networks that use advanced digital communication technologies to gather and analyze energy data, and then adjust supply and demand in real-time.

Real-time traffic information is considered a product of the Internet of Things (IoT) because it utilizes IoT technologies to gather data from various sources, such as traffic cameras, GPS devices, and vehicles, and then processes and analyzes that data to provide drivers with updated traffic information. IoT devices such as smart meters, sensors and actuators are used to monitor and control the distribution and consumption of electricity. Smart grids allow utilities to better match supply and demand, improve power quality, reduce costs, and increase reliability and resilience. Additionally, smart grids enable the integration of renewable energy sources, such as wind and solar power, into the power grid, which can help to reduce dependence on fossil fuels and lower greenhouse gas emissions.

Learn more about Iot, here https://brainly.com/question/29641982

#SPJ4

In the URL http://www.microsoft.com/surface, the portion labeled "http" is the ________.
A) protocol
B) domain name
C) path
D) top-level domain

Answers

Answer:

A: protocol

Explanation:

In a URL, the part before "://" is the protocol, the way to access the server.

"http" (HyperText Transfer Protocol) and its sibling "https" (HyperText Transfer Protocol Secure), are the most popular way to send website files (such as html, CSS, and JavaScript Files) to view in the browser.

1. If you freeze the top row in a worksheet and press Ctrl+Home, you will return to the cell A1. a. True b. False

Answers

The statement is a. True. Ctrl+Home is kind of shortcut that can be used to return to the cell A1 if freeze the top row in a worksheet.

When you freeze the top row in a worksheet, it allows you to always have the top row visible as you scroll down through the sheet. Pressing Ctrl+Home will return you to the top left corner of the sheet, which is cell A1. So even if you have scrolled down a long way, pressing Ctrl+Home will bring you back to the top row and column, allowing you to easily reference any information in the top row without having to scroll back up. This can be useful when working with large sheets that have a lot of information in the top row, such as column headers.

Learn more about shortcut, here https://brainly.com/question/11484367

#SPJ4

in order to make a window the active window, you use the ____ method of the window object.

Answers

The focus() method of the window object is used to set a window as the active window.

What does the DOM window object mean?

The window object is a global object that contains information about the DOM document that is currently open in the browser tab. The DOM document, along with any related nodes and methods that we may use to edit the DOM nodes and listen to events for each node, are contained in the document property of the window object.

Why is the window method employed?

Using a method known as windowing, you can reduce the consequences of running an FFT over a noninteger number of cycles. Each finite sequence acquired via windowing has a smaller amplitude of discontinuities at the boundaries.

To know more about focus() method visit:-

https://brainly.com/question/30022897

#SPJ4

Question 5 when constructing the ethernet datagram to send the packet from computer 1 to its gateway (router y), what information needs to be in the destination mac address?.

Answers

The information needed  to be in the destination mac address is router Z mac address.

What exactly is data?

A group of data that has been processed meaningfully in accordance with the specification is referred to as information. The attributes make it easier for the reader to access information, add to the text's content, define key terms, and emphasize key terms.

The router link used to determine the address is the router link that assists in determining the mac address. Router Z's mac address is the piece of information that must be in the destination mac address.

Therefore, the router Z mac address is the information that must be in the destination mac address.

To learn more about information, refer to the link below:

brainly.com/question/13629038

#SPJ4

Effective planning for information security involves:a.collecting information about an organization's objectives.b.collecting information about an organization's information security environment.c.collecting information about an organization's technical architecture.d.All of the above

Answers

The answer to the question is Option (d). The choices listed above are all accurate.

How do you define organization?

An group is a collection of people who interact, such as a firm, homeowners association, charity, or labor. The term "organization" can be used to describe a person, a group, a company, or the process of creating or developing anything.

What are 3 types of organization?

The organisations utilized by the majority of organizations today can be divided into three types functional, departmental, and matrix. Before choosing which of these forms to use for their company, owners must assess the benefits and drawbacks of each.

To know more about organization visit :

brainly.com/question/12825206

#SPJ4

Effective planning for information security involves collecting information about an organization's objectives, collecting information about an organization's information security environment, and collecting information about an organization's technical architecture.

Thus option D is correct.

Here,

1. Collecting information about an organization's objectives:

In order to effectively plan for information security, it is important to understand the goals and objectives of the organization. This includes understanding what the organization wants to achieve, its priorities, and its long-term plans.

2. Collecting information about an organization's information security environment:

Understanding the information security environment of an organization is crucial for effective planning. This includes assessing the current security measures in place, identifying any vulnerabilities or weaknesses, and evaluating the overall security posture of the organization.

3. Collecting information about an organization's technical architecture:

The technical architecture of an organization refers to the infrastructure, systems, and technologies used to support its operations. This includes hardware, software, networks, and data storage systems.

Collecting information about the technical architecture is essential for planning information security because it allows organizations to assess the security controls in place, identify any gaps or vulnerabilities in the infrastructure, and determine the best strategies to protect critical assets and data.

Therefore, effective planning for information security involves collecting information about an organization's objectives, information security environment, and technical architecture.

Thus option D is correct.

Know more about effective planning,

https://brainly.com/question/11228483

#SPJ6

the default tab stops are indicated at the bottom of the horizontal ruler by small vertical ____.

Answers

At the bottom of the horizontal ruler, there are tiny vertical tick marks that represent the default tab stops.

What is the suggested example?

It means to have demonstrated, highlighted, or demonstrated the need for something. Giving a lost traveler directions to the parkway is an example of indicating. YourDictionary. Easy past tense and indicate's past participle.

Legal definition of "indicated"

The term "indicated" refers to visual depictions, notes, or schedules on drawings, as well as other criteria in the contract documents. The words "seen," "noted," and "planned" are used to assist identify the reference.

To know more about Indicated visit:

https://brainly.com/question/10563917

#SPJ4

Match the protocol or encryption name with the feature. Generates a different key for every transmission, however, the encryption algorithm used for its calculations is no longer considered secure No longer considered secure because the key used for encryption doesn't change Typically uses AES for encryption Current encryption algorithm used today Typically uses TKIP for encryption a. WEP b. WPA c. WPA2 d. TRIP e. AES

Answers

The TKIP protocol creates a unique key for each transfer, but the encryption technique it employs for calculation is no longer regarded as secure. WPA2 commonly encrypts data using AES. WPA commonly encrypts data using TKIP.

Which of the following encryption methods is thought to be the safest to use in a SOHO network?

The most secure choice in this question is WPA2. Using the Advanced Encryption Standard, WPA2 protects data in transit using a 128-bit or 256-bit encryption key (AES).

In which of the following situations would an IT support specialist be most likely to intervene?

The workstation will have a functional IP address on the subnet if a DHCP server is not accessible.

To know more about protocol visit:-

https://brainly.com/question/27581708

#SPJ4

Final answer:

The protocols named WEP, WPA, WPA2, and AES correspond to different types of wireless encryption technologies. WEP is outdated and insecure because its encryption key doesn't change. WPA improved security by generating new keys for each transmission and using TKIP. WPA2, the current standard, uses AES for encryption.

Explanation:

We can match the protocol or encryption name with the feature using the following associations:

WEP is no longer considered secure because the key used for encryption doesn't change. WPA generates a different key for every transmission, however, the encryption algorithm used for its calculations is no longer considered secure. It typically uses TKIP for encryption. WPA2 is the current encryption algorithm used today. It typically uses AES for encryption. TRIP is not relevant in this context. AES is the encryption standard used by the latest encryption protocols like WPA2.

Learn more about Encryption Protocols here:

https://brainly.com/question/31926020

#SPJ6

The typical margin of error in a sample survey of 1,500 respondents is
a. 0.1 percent.
b. 0.5 percent.
c. 3 percent.
d. 10 percent.

Answers

A survey sample of 1,500 people typically has a 2.5 percent margin of error.

which word is incorrect?

A mistake or inaccurate statement, such as one made in word or action, is called an error. erroneous judgment or a false belief.

The reason it is called error

Any activity that is imprecise or incorrect is called a mistake (from of the Latin error, which means "wandering"). An error is the same as a mistake in some contexts. The word 'errare,' which means 'to stray,' is where the etymology originates from.

To know more about error visit:

https://brainly.com/question/13089857

#SPJ4

to create or edit a user cron table, you can use the ____ option to the crontab command.

Answers

The correct answer is EDITOR  option to the crontab command.Sometimes the Command key is utilised similarly to the Windows Control key; for instance, pressing Command-P and Control-P will both print a document.

The crontab -e command, which runs the text editor configured for your system environment and identified by the EDITOR environment variable, is the easiest way to create a crontab file. Using the crontab -e command is the easiest approach to generate a crontab file. The text editor that is configured for your system environment is launched when you use this command. The EDITOR environment variable specifies the default editor for your system environment. For every component of the cron schedule expression, it acts as a wildcard.

To learn more about command click the link below:

brainly.com/question/14548568

#SPJ4

a ________ is a special variable that receives a value being passed into a procedure or function.

Answers

A parameter is a specific type of variable that gets input from a process. Variables are quantities that differ from one person to the next.

Describe parameter via an example ?

The entire population under study is described by a parameter. For instance, we'd like to know what a butterfly's typical length is. This qualifies as a parameter because it provides information on the total butterfly population.

What makes a parameter different from a variable?

Variables and parameters have a distinct difference. A variable represents a state of the model and is subject to change during simulation. To describe things statically, a parameter is frequently utilized.

To know more about parameter visit :-

https://brainly.com/question/29911057

#SPJ4

A user has a computer that runs windows 10. The user reports that it takes a very long time to start the computer. You need to identify which user applications cause the greatest delays when starting the computer. Which tool should you use?.

Answers

A user has a computer running Windows 10  the user says that it takes a very long time to start the computer. To determine which user apps cause the biggest delays when starting the computer, the tool that we should use is Task Manager. The correct answer is D.

The longest startup delays are caused by Task Manager.

What is Windows 10?

On July 29, 2015, the most recent version of Windows, Windows 10, became accessible. Windows 10 is an update to Windows 8.1.

The Task Manager in Windows is a useful tool, but it frequently opens slowly or doesn't function at all.

You should first tweak a few settings in your antivirus program.

To ensure everything is running well, install the latest recent updates on your PC.

As a result, the best choice, Task Manager, causes the biggest latency when turning on the machine.

Your question is incomplete but most probably your full question was

A user has a computer that runs Windows 10.The user reports that it takes a very long time to start the computer.You need to identify which user applications cause the greatest delays when starting the computer.Which tool should you use?

A. Performance Monitor

B. System Configuration

C. Resource Monitor

D. Task Manager

To learn more about Windows 10 from the given link.

brainly.com/question/29830977

#SPJ4

The columns in a database are called __. A) records B) tablesC) files D) fields

Answers

A table's columns in a database  are a field, also referred to as an attribute. Another way to think about it is that a record is defined by a collection of attributes, and each set of attributes is present in a record.

Is a column a record or a field?

A column in a table is a group of cells arranged vertically. A field is an element that contains only one piece of information, like the received field. Typically, a table's columns store the values for a single field.

What does SQL's term for columns mean?

Rows and columns make up Records and Fields in SQL Tables, where Records refers to the rows and Fields to the columns.

To know more about database   visit :-

https://brainly.com/question/29412324

#SPJ4

A(n) ____ is an application program's or an individual user's picture of the database.​
a. view
b. catalog
c. transaction
d. ​index

Answers

The correct answer is a. view is an application program's or an individual user's picture of the database.​

Every file, folder, and drive is represented by a tiny image known as an icon in icon view. The core of the entire Macintosh religion is this little graphic, which is a depiction of electrical bits and bytes. (Perhaps that is the origin of the term "icon"). A file, application, web page, or command is represented by an icon, which is a little image or object made of graphics. You can open documents, applications, and commands more quickly with the aid of icons. Icons can be categorised as "universal," "conflicting," or "unique." Let's concentrate on each kind and how it affects user experience.

To learn more about database click the link below:

brainly.com/question/29412324

#SPJ4

when a switch receives a frame on a port and floods the frame, what does it do with the frame?
a. Discards it
b. Changes the destination address to FF:FF:FF:FF:FF:FF
c. Forwards it out all other connected ports
d. Clears the switching table and adds the frame source address to the table

Answers

A switch floods all other associated ports with a frame when it gets one on a port and sends it out.

What happens to a frame once it is received by a switch?

When a switch gets a broadcast frame, it sends the frame out of all of the switch ports aside from the ingress port where the frame was received as a broadcast frame. The top broadcast domain illustrates how each linked device receives a copy of the broadcast frame and processes it.

When does the flooding occur when a switch?

Flooding describes the switch sending the incoming frame to every active and occupied port (except for the one from which it was received). Flooding is essentially when a switch impersonates a hub.

To know more about switch visit:-

https://brainly.com/question/29691930

#SPJ4

The IT infrastructure is comprised of _______ and ________.a) IT components, IT personnelb) IT components, IT servicesc) IT services, IT personneld) IT personnel, computer-based information systemse) Computer-based information systems, IT personnel

Answers

Information technology infrastructure is broadly defined as a group of IT components that form the foundation of an IT service.

What makes up the IT infrastructure?

These aspects include hardware, software, networking components, an operating system (OS), and data storage, and they are all used to provide IT services and solutions.

What are the top three elements that make up an IT infrastructure?

Hardware, software, and networking are the three categories into which the parts of your typical IT system can be neatly divided. While these stand in for the foundation of more conventional infrastructure, cloud infrastructure nevertheless uses some of the same parts.

To know more about infrastructure visit:-

https://brainly.com/question/27956732

#SPJ4

If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?- circular reference- mixed reference- absolute reference- range name

Answers

To count the number of cells, the formula COUNTA could be used as a counting function. Go to cell.

D15 and enter =COUNTA (to count the number of cells in the Billable column that are not empty. You then close the formula, click enter, and highlight the entire Billable column from D2 to D14. The number of cells that are not empty will be returned. One of the most significant functions in Excel that enables users to compare values logically with expectations is the IF function. Therefore, an IF statement can have one of the following two outcomes: If your comparison is True, the first outcome is obtained. If it is False, the second outcome is obtained. If this is Excel, you may find cell F15 and enter the IF function there. The IF function is defined as follows: IF (condition, action if true, action if false).

Learn more about COUNTA here:

https://brainly.com/question/18902067

#SPJ4

an administrator can discover the host name assigned to a client by using the ____ utility.

Answers

an administrator can discover the host name assigned to a client by using the hostname utility.

How is the receiving host identified by its address?

Any device on the a network can be identified by its IP address, which stands for Internet Protocol.

How many Class C host bits are there in total?

A Class C address is made up of an 8-bit local host id and a 24-bit network address.The network class is represented by the first three bits of the network address, leaving the remaining 21 bits again for actual network address.Consequently, there are 256 potential local host addresses and 2,097,152 potential network addresses.

To know more about host visit:

https://brainly.com/question/28742495

#SPJ4

combining voice, video, and data communications into one interface is known as ____ communications.

Answers

combining voice, video, and data communications into one interface is known as unified communications.

What is unified communications?

Multiple enterprise communications channels, including phone, video, personal and team messaging, voicemail, and content sharing, are provided by and combined in unified communications (UC) products, which include hardware, software, and services. Control, management, and integration of these channels might all fall under this category.

A broad name for the combination of several business communication methods, such as voice calling, video conferencing, instant messaging , presence, content sharing, etc. is unified communications (UC).

Thus, unified communications.

For more information about unified communications, click here:

https://brainly.com/question/27908684

#SPJ1

technology that recognizes human voices interprets their meaning and offers a response in return

Answers

Answer:

Speech recognition systems use computer algorithms to process and interpret spoken words and convert them into text.

Answer:

There are multiple things this could mean.

Explanation:

For Example, this could be a chatbot, a bot that will talk to you in real time using AI generated sequences.

A second thing this could be is A.I in general.

If not that It could be A.I generated subtitles.

true false 1. Data and information are NOT interchangeable terms. 2. The operating system is a type of application software. 3. The Ethernet port is an example of a connectivity port. 4. A typical CPU can complete billions of machine cycles in one second

Answers

Although the words "data" and "information" are sometimes used interchangeably, they are not the same thing. These elements' functions and subtle distinctions between them.

What is the main difference between information and data?

Data and information differ primarily in that material is made up of unprocessed, raw facts and statistics, whilst information is made up of processed, distilled data that may be used by decision-makers.

What aspect of a computer's operation transforms data into information?

Electronic circuits that understand and carry out program instructions as well as communicate with input, output, and storage devices make up the central processor unit. Data are actually converted into information by the central processing unit.

To know more about data visit :-

https://brainly.com/question/11941925

#SPJ1

5 points Status: Not Submitted In this article, the American Heart Association recommends that adult men get no more than 36 grams of added sugar and adult women get no more than 25 grams of added sugar per day. In this program, ask the user to enter the number of grams of added sugar they have eaten that day. Using 30 grams as the cut off point, use a boolean statement to state if the user can eat more sugar. Here is what your output should look like: How many grams of sugar have you eaten today? 28 You can eat more sugar: true Source: https://www.heart.org/en/healthy living healthy eating/eat- smart/sugar/added-sugars 3.1.7: Sugar Tax Save Submit + Continue 1 import java.util.Scanner; 2 3 public class Added Sugar 4-{ 5 public static void main(String[] args) 6 { 7 // Create a Scanner object 8 9 // Ask the user for the grams of sugar 10 11 // Use a boolean expression to print if they can eat more sugar 12 } 13}

Answers

Men should limit their daily intake of added sugar to no more than 9 tablespoons (36 grams or 150 calories). The amount is less for women: 6 tablespoons (25 grams or 100 calories) daily.

What is the recommended daily intake of added sugar for people at the moment?

Americans who are 2 years old and older limit their added sugar consumption to less than 10% of their daily caloric intake.

What is the American Heart Association's most recent advice on added sugars?

The American Heart Association advises keeping daily added sugar intake to no more than 6% of total calories. That amounts to no more than 100 calories, or roughly 6 teaspoons of sugar, each day for the majority of American women. It amounts to 150 calories, or around 9 teaspoons, each day for men.

To know more about American visit:-

https://brainly.com/question/11898966

#SPJ4

Which data type stores only one of two values?

O a. Hyperlink
O b. Date/Time
O c. Yes/No
O d. AutoNumber

Answers

There are only two potential values for the boolean data type: true and false. Use this data type for straightforward true/false flags.

What form of data contains binary values?

Any sort of binary data can be stored as an undifferentiated byte stream using the BYTE data type. The majority of the time, binary data comprises of digitised information like spreadsheets, programme load modules, voice patterns, and so forth.

What two types of numbers can be utilised as data types?

There are two forms of numerical data: accurate and approximative. Integer and decimal data types are examples of exact kinds. Floating point data types are examples of approximate kinds.

To know more about binary visit:-

https://brainly.com/question/19802955

#SPJ4

you may need an appropriate loader to handle this file type, currently no loaders are configured to process this file.

Answers

Yes, Webpack will provide significant benefits if you are developing a complex Front EndTM application with many non-code static assets such as CSS, pictures, fonts, and so on.

Webpack does not require the use of a configuration file out of the box. It will, however, presume that your project's entry point is src/index. js and will output the result in dist/main. js minified and optimized for production. Webpack is a free and open-source JavaScript module bundler. It's designed mostly for JavaScript, but it can also modify front-end components like HTML, CSS, and pictures if the appropriate loaders are present. Webpack takes dependencies from modules and creates static assets to represent those dependencies.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

What type of programming contains class definitions? a procedural b. top-down c object-oriented d. modular .

Answers

Class definitions are part of object-oriented programming. Top-down thinking is used in procedural programming.

For novices, what is programming?

Computers follow a set of written instructions called computer programming. There are numerous languages in which to write these instructions. The term "syntax" refers to the distinctive ways that each computer language arranges the commands. The same programming problem can be solved using a variety of computer languages.

What is programming, exactly?

To "instruct the computer to accomplish different tasks," one uses programming. Confusing? Let's thoroughly comprehend the definition. The phrase "instruct the computer" fundamentally means to give it a set of instructions that are written in a language that it can comprehend.

To know more about Programming visit:

https://brainly.com/question/11023419

#SPJ4

Final answer:

Class definitions are utilized in object-oriented programming, making the answer to your question is option c. Object-oriented programming divides problems into smaller parts using objects.

Explanation:

In the world of programming, class definitions are used in object-oriented programming. So, the answer to your question is c. object-oriented. Object-oriented programming is a type of programming that is based on "objects", which can contain data and code; data in the form of fields, and code in the form of procedures. The key feature of object-oriented programming is that it divides the problems into small parts using objects. Each object is a specific instance of a class, which can be defined as a blueprint for objects. Classes contain attributes (data) and methods (functions) that define the behavior of the objects.

Learn more about Object-Oriented Programming here:

https://brainly.com/question/31948800

#SPJ11

Final Test CSC 1301 (048) Full Name: 4) a) Write a program to generate Fibonacci sequence: 1 1 2 3 5 8 13 21 34 55 b) What is the output of the following unknown method for (int i-1; ca2; i+) for (int j-1;js 2:j++) for (int k 1; k<3; k++) System.out.print ("&"); System.out.print ("") System.out.println): 5) a) Write a program with a method called maximum that takes three integers as parameters a returns the largest of the three values (using Math.max() method). b) Write a program with a method called slope that take 4 parameters, (x1, y1, x2, y2 co-ordinates) as Inputs and returns the slope as an output. (Cal. Slope with formula y2-y1/x2-x1) 6) a) Write a program with a method called sphereVolume that accepts a radius as parameter and returns the volume of the sphere with that radius. For example, the call sphereVolume(2.0) should return 33.510321 by using the formula 4/3*pi* rr*r (use java constant Math.Pl) b) Write a program with a method revNum that accepts an integer parameter and returns the reverse of the number. For example, the call revNum(29107) returns 70192 7) a) Write a program prompting the user to enter the password. If the password is incorrect, it should continue asking 3 more times, (every time the password is incorrect). Finally, after 3 attempts it should display a message saying, all the attempts are done, try sometime later. If, you have entered correct password it should display message, your password is correct. b) What is the output of the following hello method public class Strange f public static final int MAX 5; public static void hellol1 int number 0; for (int count- MAX; count 3; count--) number +(count*count): System.out.printin(" The result is:"+ number); Public static void main (String [ ) args) hello);

Answers

The code of the subsequent code segment is shown here. The initial loop shall iterate only three times, first loop will loop three times more, or nine times, and the last loop will iterate three times more, or 27 times.

What in coding is segmentation?

In addition to or in instead of paging, segmentation is a different method of allocating memory. In its most basic form, the program is divided into several sections, which are each a stand-alone entity that includes a subroutine and data structures. Segments can be any size, unlike pages.

What in C# is a code segment?

The term "code segment" refers to a piece of a computer database that includes object code or a segment of the a project's address space that is comparable and provides details on commands and directives that can be executed. A code segment may also be referred to in the computing field as a particular text or just text.

To know more about code segment visit:

https://brainly.com/question/20063766

#SPJ4

At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?

Answers

The data link layer is the only layer with a protocol (like Ethernet) that adds both a header and a footer. Data encapsulation refers to the procedure of inserting headers and footers.

Where in the Open Systems Interconnection OSI model do data packets get routed?

The alternative method of packet routing involves finding the optimum route across a physical network. In order to route packets to a target node, the network layer needs network addresses, which are commonly Internet Protocol addresses.

What layer of the Open Systems Interconnection OSI model does networking hardware like switches and bridges operate on?

Layer 2 switches (switching hubs) and bridges are examples of network hardware that operate at this layer. The data connection layer is segmented.

To know more about Data encapsulation visit:

brainly.com/question/29563804

#SPJ4

A social bookmarking site is dedicated to providing all of the following except ________. to reconnect with colleagues for business progress to share favorites to store and categorize favorite sites to annotate

Answers

A social bookmarking website is intended to helping workers reconnect for the benefit of their companies.

Using a browser-based application to tag a website page makes it simple to return to it later. This practise is known as social bookmarking. You may utilise the functionality of various platforms to bookmark posts rather than adding social media updates to your browser's favourites. You may access the bookmarks from any location and on any internet-connected device since they are online.

Social bookmarking websites started off as straightforward tools for content and social media marketers. These days, they are vibrant, varied online communities where members create groups based on common relevance.

Discussion topics are arranged into distinct rooms or threads on social bookmarking websites, where users follow stuff that interests them. Following a piece of material requires

Learn more about Social Bookmarking here:

https://brainly.com/question/1332445

#SPJ4

Type the correct answer in the box.

Use numerals instead of words.
If necessary, use / for the fraction bar.

In which year did the government decommission ARPANET?

The government decommissioned ARPANET in

Answers

The government decommissioned ARPANET in 1990, and the government did that because the newer version of the internet came into play, so the ARPANET, which was the older one, got decommissioned.

What is ARPANET?

This was the early internet that was controlled and regulated by the United States defense sector, and it used the packet switching technology by which the messages are sent and the communication is done, but later, when the new and advanced version of the internet came into play, the government decommissioned it in 1990.

Hence, the government decommissioned ARPANET in 1990, and the government did that because the newer version of the internet came into play, so the ARPANET, which was the older one, got decommissioned.

Learn more about ARPANET here.

https://brainly.com/question/28577400

#SPJ1

Identify the type of welding safety hazard indicated or avoided based on the images below.

Answers

1) In 1, the welding safety hazard indicated or avoided is: lack of oxygen

2) In 2, the wielder is avoiding eye injury

3) in three, the welder is avoiding porosity

4) The welders in the picture are avoiding fire burn injury

5) the welder is avoiding gaseous poisoning.

What is the rationale for the above answers?

1) In the first picture, the welder wears an oxygen mask because he or she is welding in a tank which can quickly run out of oxygen due ot the combustion going on. The second welder on the tank is holding a rope bound to the welder inside to quickly pull them out if an accident occurs.

2) Note that the use of Protective Equipment to is required to shield the eyes from damage arising from the bright light of the welding and the sparks therefrom.

3) White powder is used during welding in some cases to avoid porosity.

4) By wearing full gear, the welders are making sure that they are not exposed to burns from the fire sparks.

5) Gaseous poisoning is a possible hazard from welding.

Learn more about Welding Hazards:
https://brainly.com/question/17469595

#SPJ1

Other Questions
6 Why was Joseph's grandfather not sure if they would win the prize? What is the passive voice of I am a boy? Need help with another one of these, I still can't seem to understand. the british took land first along the coast of the ____ ocean The video on parents' involvement in kids' sports showed a mother's drastic actions of getting her daughter's teammate disqualified for cheating on a test in order for her daughter to be please help quicklyThe polygons are similar. x = ___ Write your answer as a decimal Solve for x. 4x 4 < 8 AND 9x+ 5 > 23 4x423 In these excerpts, Shackleton praises the shipbuilders. How does this help emphasize the power of the ice he then describes? The triangle to the right has an area of 35 square units. What would be the area of a new triangle if the scale factor were 2? Show your work with one equation How do you be a good citizen of the community and contribute to its development? What are the 3 concepts of Bandura's social learning theory? a long bone consists of a shaft composed of ________ and an end composed of ________. If the monitoring instrument develops an inability to average, steps to take would include all the following except:?O Posterior tribal and ulnar nervesO An electrical stimulation is required to pace the stimulusO Consult with the anesthesiologist anesthesia changesO An increase in latencies and a decrease in amplitudes a copper wire is 20 m long on a winter day when the temperature is 12c. By how much does its length increase on a 26 ?C summer day?Express your answer using two significant figures. list five reasons the stock will go down How can this sentence be changed into a compound sentence?Muriel will hand out the yearbooks you can pick one up in the student government office. A. Add a comma and the conjunction or after yearbooks. B. Remove in the student government office C. Insert a semicolon and so after yearbooks. D. No change needs to be made to this sentence. Jim usually sails his boat 20 miles from the boat launch to Kingston. Today he is driving the 16 miles from the boat launch to the marina. How far will he sail across the lake to Kingston from the marina?HURRY PLEASE How do you humble a narcissist? The powers accorded to the states in the Tenth Amendment are known as ________ powers.A. policeB. reservedC. impliedD. concurrentE. enumerated How many grams of propane contains the same number of carbon atoms as those in 1.0g C2H5OH ?