A text-only forum accessed through a bulletin board service (BBS) is known as a _____.

Answers

Answer 1

Answer:

newsgroup---for apex

Answer 2

Final answer:

A text-only forum accessed through a bulletin board service is known as a discussion board, a precursor to modern internet communication systems.

Explanation:

A text-only forum accessed through a bulletin board service (BBS) is known as a discussion board. In the infancy of the internet, bulletin board systems were an early form of online communication.

These systems were pre-internet computer networks that connected personal computers using modems and phone lines. Users of BBS could share files, post messages, engage in discussions, and even play text-based games.

The significance of BBSs at the time is comparable to the modern-day impact of the European Union (EU) on trade or climate change on environmental policies - they transformed their respective fields.


Related Questions

Imposing stricter recycling regulations would greatly benefit our city in many ways.

Which is the best revision of the underlined portion of the sentence?
would be a totally beneficial thing to do.
would be great and I’ll tell you why.
would be pretty great for our city for many reasons.
no change

Answers

The answer is (D) no change

Given that there is no underlined portion of the sentence, we cannot completely answer this question. However, basing on the excerpt borrowed from Erika’s letter to her mayor, I honestly would not change anything. Given that Erika is addressing the mayor about a serious issue, The sentence’s choice of words is correct and sounds very academic, professional and formal, something that Erika would want to achieve.



Answer:

(D) no change

Explanation:

What is the default delay before scripts are executed?

Answers

Answer is 5 minutes

The default value for windows 8.1 joined to a server 2003 domain logon scripts delays is not configured. However, the windows 8.1 may have a delay processing logon scripts of 5 minutes. The script does not execute until 5 minutes are over. Users have a Group policy applied to them that is used to assign a logon script.


"explain why professional software is not just the programs that are developed for a customer"

Answers

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






Which theory uses game playing to understand the development of self?

Answers

Mead's role-playing theory uses game playing to understand the development of self.
According this theory game is one of the three activities through which the self is developed, The other two are language and play.  Through these activities people interact with other people and  develop self-images.

When using an online media source, students should ensure the information is

Answers

viable and true. hope this helps!
relevant, credible, and valid.

What do the concepts of data warehousing and data mining mean?

Answers

The term data warehouse denotes a group of databases that work together, which means enables integration of data between different databases. The data warehouse is a source of the data that is used for example in  the process of discovering interesting and useful patterns and relationships in large volumes of data. This process is called data mining.

Data warehousing involves collecting and managing large volumes of data, while data mining is used to discover patterns and insights from this data. Metadata, resolution, accuracy, and interoperability are key when evaluating data for analysis. Standardization is crucial for effective data retrieval and analysis.

Data warehousing is the process of collecting, storing, and managing large volumes of data from various sources in a central repository. Its purpose is to consolidate disparate data into a single, coherent database for efficient querying and analysis. On the other hand, data mining is the technique of discovering patterns, correlations, and insights from large datasets through statistical and computational methods. It forms part of a broader process of knowledge discovery in databases (KDD) and can include predictive analytics, which anticipates future trends and behaviors.

Key Concepts in Choosing Data for Analysis

Resolution: The level of detail within the data.Accuracy: The correctness and reliability of the data.Interoperability: The ability of the data to integrate and function with other datasets.

All these factors are part of metadata, which is essential for understanding the context and quality of the data. Metadata includes information such as the location, attributes, and time of data collection, aiding in the effective organization and interpretation of the data.

Aggregating and Analyzing Data

Data mining plays a crucial role in making sense of vast amounts of data collected from various surveillance and transactional sources. Through sophisticated algorithms, it turns the raw data into actionable insights, enabling organizations to leverage big data for decision-making purposes.

Standardization in Databases

To accommodate data inconsistencies and enhance retrieval and analysis, standardization through classification and coding is applied. This helps in unifying differing representations of similar data within the database, facilitating accurate analysis and querying.

When evaluating a dataset's adequacy, it's important to consider the relevance and quality of the data in relation to the research questions or conceptual framework. The process should be part of a well-planned research design to avoid irrelevant or useless data, highlighting the limitations of blind data mining.

what is the relationship between ionic bonds and cleavage

Answers

Hello there!

The relationship between ionic bonds and cleavage is: As the ionic bond strength increases, cleavage will be more difficult. 

Minerals are held together generally by ionic bonds. Ionic bonds are the result of electrostatic attraction and electron transfer between positive and negative ions (cations and anions). Ionic bonding implies the formation of ordered crystalline solids and the cleavage of those solids will depend on the strength of this bonding. 

Which of following allows you to share a file with someone that is too large to send via e-mail?
Dropbox
Google Drive
One Drive
All of the above

Answers

One can share files via email that is too large by drop box, g drive, and one drive. The correct option is D.

What is a drive?

A drive is a location (medium) that can store and read information that cannot be easily removed.

All drives contain files and programs that your computer uses. When you write a letter in a word processor, for example, the program is loaded from the drive.

When you need to send large files via email but they are too large, one of the more efficient solutions is to use cloud-based storage services.

Cloud storage services such as Mail Drop, OneDrive, and G Drive are excellent options for sending large files via email.

Thus, the correct option is D.

For more details regarding drive, visit:

https://brainly.com/question/966908

#SPJ5

Raul looks at different technologies that will help him do his job. What part of the process is this?

analyzing options
determining the goals
evaluating the decision
gathering data

Answers

This process is known as analyzing options. When Raul looks over different options and/or technologies that will help him do his job, he is going over the different options and seeing which option is best for him. When deciding which is best for him, he will need to consider: what Raul needs it to complete, how each technology option compares to the next, the price point and all of the functions the technology can do. After he figures out what it can do compared to what purpose he needs it to serve, he can determine the best option for himself.

This portion of the process is actually called gathering information.

I tried the other option on Odesseyware and got it incorrect.

I hope this helps!

The unique constraint differs from the primary key constraint in what way?â

Answers

The following question has multiple choices as follows

a. The UNIQUE constraint ensures that a specific condition is true before a data value is added to a table.

b. The UNIQUE constraint can be created at either the column level or the table level.

c. The UNIQUE constraint allows NULL values.

d. The UNIQUE constraint does not allow NULL values.

The answer is (C) The UNIQUE constraint allows NULL values.

The unique constraint differs from the primary key constraint in that it allows Null values. Primary key is not nullable while Unique constraints may be nullable. If for instance you try to make a nullable column as your primary key, SQL server will first convert it into a NOT NULL and then create the primary key.

What is the exact number of bytes in a system that contains 6.4 bytes?

Answers

I believe this question should be; What is the exact number of bytes in a system that contains 6.4 Gbytes?

1 Gigabyte = 1,073,741,824 bytes 

How about 6.4 Gb = X?

X = (6.4 Gb×1,073,741,824 bytes) / 1 Gigabyte

X = 6,871,947,674 bytes

 

Each​ _____ in a relational database table is a unique record of something that users want to track.

Answers

Database is a self-describing collection of integrated records.
Each​ key in a relational database table is a unique record of something that users want to track. The key is a column or group of columns that identifies a unique table row  and establish relationships between tables and within a table. 

All spreadsheet formula should start with

Answers

A formula in Excel will ALWAYS start with = then the function name like
=SUM(A1:A5)

How do you make a tip calculator out of code. getting the cost of 3 guests food and the tip % and calculating the total bill.

Answers

You have to multiply 3 costs of food by 3 then you multiply it by the % of tip.

Conformity is the acceptance of culturally approved goals and the means for achieving these goals.

Answers

Answer:

The following statement is "True".

Explanation:

Conformity acceptance word divided into two parts that are Conformity and acceptance. Conformity stands for change in behavioral change or conviction. Or considered the stress of the party. and the acceptance stands for thinking and trusting across community standards.  behaving and believing along social lines.

In other words we can say that achieving cultural goals via channels that are culturally approved and utilizing traditionally unorthodox methods to achieve cultural goals.

How does a router handle a packet destined for a network that is not listed in the routing table?

Answers

The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






Final answer:

A router handles packets destined for networks not listed in the routing table by using a default route or dropping the packet.

Explanation:

A router handles a packet destined for a network that is not listed in the routing table by using a default route or a gateway of last resort.

A default route is a general route that the router uses when it doesn't have a specific entry for the destination network. It allows the router to forward the packet to another router that may have more information about the destination network.

If there is no default route, the router will drop the packet and send an ICMP (Internet Control Message Protocol) message back to the sender, indicating that the network is unreachable.

A group of scientists are working on research. All of them need to simultaneously work on the computer and perform different operations. Which operating system do they need to use?

Answers

probably windows 10 because you can have more than one desktop on the same computer.i hope this helps!

On the attendance worksheet, in cell l5, enter an if function to determine if the percentage in cell k5 is greater than or equal to the goal in cell h18. the function should return the text goal met if true and review if false. set the reference to cell h18 as an absolute reference

Answers

You have tot do these steps:
Ribbon
1.Click cell L5. On the FORMULAS tab, in the Function Library group, clickthe Logical, and then click IF.
2.In the Function Arguments dialog box, with the insertion point in the Logical_test box, type K5>=$H$18.
3.Press TAB to select the Value_if_true box.
4.Type Goal Met.
5.Press TAB to select the Value_if_false box.
6.Type Review.
7.Click OK.

Keyboard
1.Click cell L5, and type =IF(K5>=$H$18,"Goal Met","Review") (or =if(k5>=$h$18,"Goal Met","Review") or =IF($H$18=0.8,"Goal Met","Review") or =if(k5>=.80,"Goal Met","Review") or =IF(0.80
2.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the leftof the Formula Bar).

Keyboard (2)
1.Click in the Name box, type l5 (or L5), and then press ENTER. type =if( (or =IF( or =If().
2.Click cell K5, and then type >=.
3.Click cell H18, press F4, and then type ,"Goal Met","Review".
4.Press ENTER (or TAB or CTRL+ENTER or click the Enter button to the left of the Formula Bar).

Which of the following statements is considered a safe rule of communication A Anyone you know only online is a stranger to you B After you get to know someone online, they can be considered a trusted friend C If you want to know if you can trust someone you met online, ask him to meet in person D Most people online are safe, so you don’t really need to worry about safe communication

Answers

A. Anyone you know only online is a stranger to you.

Answer:

A

Explanation:

took quick check conexus

How can you tell the difference between subnet addresses and interface addresses?

Answers

The network interface address is an network address  that belongs to an interface and defines that interface in the network. Any device with an IP Address, has an IP Address on an interface. The subnet address (or subnet mask) on the other hand defines the routing prefix of an address and divides the IP address into network and host addresses. 
There can be same subnet addresses, but the interface address must be unique defined.
Final answer:

Subnet addresses are used to divide a network into smaller subnetworks, while interface addresses are used to identify specific devices or interfaces on a network.

Explanation:Difference between subnet addresses and interface addresses

In networking, subnet addresses and interface addresses serve different purposes.

A subnet address is used to divide a large network into smaller subnetworks, allowing for better organization and management of network resources. It is a range of IP addresses that share the same network prefix and subnet mask. For example, in the IP address 192.168.0.0/24, 192.168.0 represents the subnet address.

An interface address, on the other hand, is used to uniquely identify a specific device or interface on a network. It is a unique IP address assigned to a network interface such as a network card or router interface. For example, an interface address could be 192.168.0.1.

Which type of loop is best if you do not know how many times you need the loop to run?

Answers

while:  the loop must repeat until a certain "condition" is met.  If the "condition" is FALSE at the beginning of the loop, the loop is never executed.  The "condition" may be determined by the user at the keyboard.  The "condition" may be a numeric or an alphanumeric entry.  This is a good, solid looping process with applications to numerous situations. 
while:int ctr = 1;
while (ctr < = 20)
{
     cout<< ctr++ <<"\n";
}



HOPE i HELPED! brainliest? :D 

Which of the following would most directly affect the operations of the digestive system

Answers


The answer:
The heart

Explantion:
Decreased blood flow can cause decreased motility in the gut causing nausea, lack of appetite, ineffective digestion and malabsorption of nutrients. Decreased blood flow can also cause stress on the gut and result in gastric ulcer formations.

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a _____.

Answers

To change the overall design of an entire document to include colors, fonts, and effects, a user should apply a theme.

What are the characteristics of a theme?

The characteristics of the theme are as follows:

A theme may be defined as a combination of desktop background pictures, window colors, and sounds. It is used to determine the visual appearance of all windows, applications, dialogs, panels, and applets. It completely demonstrates the visual interface to the items that appear on the window.

The theme can be utilized in order to change the complete design of an entire document to include colors, fonts, and effects. Sometimes, themes are modified according to the need and interests of the user. They possess specific properties in the computer and technology.

Therefore, a user should apply a theme when he/she wants to change the overall design of an entire document to include colors, fonts, and effects.

To learn more about Theme, refer to the link:

https://brainly.com/question/26624021

#SPJ6

Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he works and what he does there?

Answers

Answer:

the answer is c

Explanation:

Answer:

C. in a laboratory, where he designs power plants, and in a factory where the plants are manufactured

Explanation:

The data in a database management system that identifies the names of​ tables, fields in each​ table, and the properties of each of the​ fields, as well as which fields are primary and foreign​ keys, etc. is called​ ____________.
a. data definitions
b. metadata
c. qualitative data
d. descriptive data
e. uberdata

Answers

The answer is (B) Metadata

By definition, Metadata describes other data or data about other data. In simple terms, it provides context for data. In DBMS, metadata defines attributes and data elements like data type, name, size, and etcetera. It also defines data that could be about records and structures like columns, length and fields.


B. Metadata is correct answer

Presentation aids should include short phrases or images to convey your message. True False

Answers

True

Other than words of speech, presentation aids are items used to support what the speaker is relaying. They can be visual or audio aids or other technologies that are supported. Highlighting new points with appropriate and short phrases, rather than complete sentences is important to a good presentation aid.
Images or photographs on the other hand provide a picture of reality and are used to illustrate a point, action, or evoking an emotion. It shows an important but an unfamiliar detail.  




Coordinates that measure how far a point is from the origin are _______________. A. Relative coordinates B. Absolute coordinates C. Negative coordinates D. X coordinates

Answers

the correct answer is B

Answer:

answer b

Explanation:

Why would you use the ‘assign to me' function in the drop down menu of an incoming message?

Answers

Socially, it is an important step for entering the message into an approvals queue. It is also an easier way to remind yourself to make a response later to that social message you received. One can only assign a message to other team members and vice versa.






Camile uses specialized equipment designed by Olivia to analyze and predict weather and atmospheric changes. Which describes the career pathways of Camile and Olivia?

Answers

Camile   can go into Meteorology.
Olivia  should go into  engineering

answer

Olivia is in the Engineering and design pathway and Camille is in the science and meteorology pathway.

Explanation

engineering and design path way- this is a methodological series of steps that are used by engineers in creating functional products and processes.

science and methodology pathway- these are steps used by scientists to create explanations based on the evidence which they have gathered.

What server type is normally used for data farm and archive server operations?

Answers

I think it’s the international server
A server farm is a group of computers acting as servers and housed together in a single location. A server farm is sometimes called a server cluster. So, a database server is the most appropriate answer.

I hope this helps!
Please Rate & Thank!
Please mark as Brainliest!

Have a wonderful day! : )
Other Questions
A college professor's compensation package includes the total cost of a $325-per-month health insurance plan, the total cost of a $65-per-month life insurance plan, and a salary of $62,000 per year. What is the yearly value of the compensation package? A total of 757 tickets were sold for the school play. They were either adult tickets or student tickets. There were 57 more student tickets sold than adult tickets. How many adult tickets were sold? What was the difference between Darwin and Lamarck List the six areas of enculturation that are learned throughout a person's lifetime? Solve 8x^2+5=35Round to the nearest hundredth.The solutions are___ and ___Thanks! I need help with this one. HELP ASAP.What events influenced the growth of the environmental movement in the United States? Why did the environmental movement attract many of the same people who had participated in other movements? Do you think the environmental movement has had a positive or negative effect on the United States? Which law would you use to simply the expression 3^10/3^4 (ENVIRONMENTAL SCIENCE NOT PHYSICS) 7. gradually taking over farmland over a long period of time is known as commodities. True or False8. The 2002 farm bill gives money to farmers who grow crops like wheat and soybeans but not to fruit and vegetable farmers. True or False9. some farmers have been selling their land to developers because it is more cost efficient to do so than to grow crops. True or False10. The FBI regulates the use of pesticides in agricultural crops. True or False Which is a correct classification for the triangle? A. Acute triangle B. Obtuse triangle C. Equiangular triangle D. Right angle Which Value of t makes the following true -16+t A subject is given a sugar pill and is told it may treat anxiety. this person may experience: A)informed consent B)control C)the placebo effect D)randomization A certain recipe calls for 2 1/3 cups of sugar, how much sugar is needed to make 1/3 of the recipe? If the frequency of p^2 equals 0.49, what is the value of q?A. 0.3B. 0.009C. 1D. 0.7 (02.04 HC)List an example of how an ecosystem can be affected by weather patterns. Explain how ocean temperatures affect weather patterns. The great-grandson of a slave, I argued the case against "separate but equal" and against Brown v. Board of Education before the Supreme Court. I won. This was the beginning of a tremendous change in the United States. Who am I? Which BEST describes the ways the United States' tariff policies between 1816 and 1860 contributed to the South's secession and the Civil War? A) The United States' tariff policies caused Northern states to become jealous of Southern states' manufacturing power. B) The United States' tariff policies created a positive relationship between the American South and Britain. C) The United States' tariff policies favored Northern manufacturers and harmed Southern farmers. D) The United States' tariff policies made slavery illegal in the Southern states in the Union. What three kingdoms hold the most common pathogens? Where would this paragraph fit best in an informational essay? In summary, the northern lights are a phenomenon that have fascinated people for thousands of years. The spectacular light show in the sky draws travelers from all over the world, and now you know why. Next time you are outside at night, imagine what the sky would look like lit up with green, yellow, and streaks of red. There is nothing quite as brilliant as this natural occurrence. The following conversation is missing some phrases or words. Choose the answer that best completes the numbered blank space.Pilar: Hola, Fred! (1) ?Fred: Hola, Pilar. (2) dos y media.Pilar: Gracias. Vas t al partido de ftbol hoy?Fred: Posiblemente. (3) es el partido?Pilar: (4) cinco (5) cuarto.(1)a.A qu horad.Qu hora esb.menose.Es a lasc.Son las Mr.holms used 4/5 of a carton of orange juice.he used equal amounts of leftover juice for two servings what fraction of the whole carton of juice did he use for each serving