A collaborative web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.

Answers

Answer 1
A collaborative Web page that is designed to be edited and republished by a variety of individuals is called ad Wiki. A wiki is a server program that allows users to collaborate in forming the content of a Web site. The term comes from the word "wikiwiki," which means "fast" in the Hawaiian language.The simplest wiki programs allow users to create and edit content.

Related Questions

If your role model is from the same neighborhood as you or has the same ethnic background, _____.

Answers

your role model probably faced some of the same challenges as you will face
during your career

The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.

Answers

Those are your good ol' peripherals.

The input/output units are the devices that allow a computer system to communicate and interact with the outside world, as well as store information.

What are input-output units?

Equipment that inserts data into or extracts data from communication, computer, automatic data processing, information, or control systems, such as a terminal, channel, port, computer, storage unit, buffer, communications network, front-end processor, link, or loop.

The devices that enable a computer system to interface and communicate with the outside world as well as permanently retain information are known as input/output (i/o) units.

A computer input unit is a piece of hardware used to deliver control and data signals to a data processing system, which may include a computer or other information device.

Therefore, the equipment that enables a computer system to interface and communicates with the outside world, as well as store data, are known as input/output units.

To learn more about input-output units, refer to the link:

https://brainly.com/question/3033646

#SPJ5


What is the name of a coding scheme that assigns a specific numeric code to each character on your keyboard?

Answers

python is the answer to your question

which type of website would a business selling merchandise on the internet use? A person B information C commercial D social

Answers

I think it's C, commercial.

Lara sees her colleague taking a bribe from a customer. What should she do?

Answers

She should report it to the superviser

She should gather evidence and tell a trusted supervisor.

The android operating system is used by many popular tablet computers. which tablet does not use the android operating system

Answers

Apple Ipad and Microsoft Tablets.

In normal view, powerpoint's ________ contains buttons such as notes, comments, and view.

Answers

In normal view, powerpoint's status bar contains buttons such as notes, comments, and view. Status bar is located at the bottom of the PowerPoint application window, and it is needed to show both all the information about the document and user's ability to change the settings of a presentation. Status bar includes such specific items as : zoom control, slide number, comments and note pane buttons and view control.

Which type of encryption is the most popular form of e-mail encryption?

Answers

Public Key Cryptography is the most popular form of encryption in emails. This type of encryption utilizes "keys" only known to the owner of the set of data. 

You try to enter your name into a cell that accepts a numeric value. What error would you receive

Answers

A. #NAME

B. #VALUE

C. #REF

D. #####

E. #DIV


#VALUE on plato

your answer is B. #VALUE

_____ memory uses the hard drive to substitute for ram.

Answers

Virtual memory uses...

Answer:

Virtual memory

Explanation:

The RAM is the main/primary memory of the computer because its data is easily accessible when needed by the computer while the hard drive/hard disk is the secondary memory/permanent memory of the system.

The Virtual memory is a memory management capability of a system that allows the transfer of data from the main memory which is the Ram to a secondary memory like the hard drive. this is mostly done when the Ram is running low on space and probably slowing the system down.

Which is the largest of the four information technology pathways?

Answers

information support and services

Answer:

Information support and services

Explanation:Apex

Which of the following lines of distribution best describes the diagram?

A: retail distribution
B: direct distribution
C: distribution by agents or brokers
D: wholesale distribution

Answers

A) retail distribution.

Answer

retail distribution

Explanation

Retail distribution is the process or path that a manufactured good takes to reach its intended consumer. Manufacturers employ different retail distribution strategies for the purposes of interacting with customers.Sometimes the distribution channel is direct, such as when a consumer purchases a product directly from company without involving any intermediary.

Which tool captures the passwords that pass through a network adapter, displays them on the screen instantly, and is used to recover lost web/ftp/e-mail passwords?

Answers

Asterisk Logger would be one of the tools

Simon is trying to figure out how much it will cost to buy 30 cases of water for a school picnic. How much will Simon pay for 30 cases of water?

Answers

it depends on price, brand, number of bottles per case, and number of fluid ounces per bottle.

(price per bottle x number of bottles per case) x 30

Answer:

answer is d

Explanation:

How to change the indent of the list item "regular" on slide 2 to .5 inches in powerpoint?

Answers

Final answer:

To change the indent of a list item in PowerPoint, select the item, go to the Paragraph section under the Home tab, open the Paragraph settings, and adjust the indentation to 0.5 inches.

Explanation:

To change the indent of the list item "regular" on slide 2 to .5 inches in PowerPoint, follow these steps:

Navigate to slide 2 in your PowerPoint presentation.Click on the text box containing the list item "regular".Select the list item or items you want to change.Under the Home tab, find the Paragraph group.Click on the dialog box launcher (small arrow in the bottom-right corner) in the Paragraph group to open the Paragraph settings.In the Indentation section, find the 'Left' or 'Before text' option.Enter 0.5 inches in the field or use the up and down arrows to adjust the setting.If you want a hanging indent (where the first line starts at the left margin and subsequent lines are indented), under 'Special', select 'Hanging' and ensure the setting is 0.5 inches.Click 'OK' to apply the changes.

This will set the indent of the list item "regular" to 0.5 inches from the left margin on the selected slide.

Final answer:

To change the indent of a list item to 0.5 inches in PowerPoint, select the desired list item, use the ruler to drag the indent marker or access the paragraph settings to manually adjust the left indentation.

Explanation:

To change the indent of a list item to 0.5 inches in PowerPoint on slide 2, go to the slide where your list is located. Select the list item labeled "regular" that you want to change. Then, on the ruler at the top of the slide, drag the appropriate indent marker to the 0.5-inch mark on the ruler. If the ruler is not visible, you can enable it through the 'View' tab by clicking on 'Ruler'. Alternatively, you can right-click on the selected list item, choose 'Paragraph' from the context menu, and then adjust the indentation settings in the dialog box that appears by setting the 'Left' indentation to 0.5 inches.

If a business wanted to play an artist’s song in the background of their website, it must first consider the _____ of the music to ensure no laws are being broken.

Answers

no copyright laws being broken. the answer is copy right.

Answer:

copyright

Explanation:

Copyright is the set of national and international legal principles and norms that protect the creation of intellectual works by human beings.

There are two traditional legal conceptions of intellectual property: disseminated in the area of ​​influence of Anglo-American law and copyright, prevailing in the area of ​​influence of Latin law. In addition, there is now another conception, of a universal nature, free licenses, which some call "copyleft". And there is also the public domain. The first two have their origin in the monopolies that the monarchs granted to the authors to stimulate intellectual creation, and coincide in protecting the rights of the authors by granting them the power to exclude all other people from the use of the works, except the simple and individual reading, visualization, listening.

The default dfs namespace mode is windows server 2008, which supports up to 50,000 folders. how many folders does using non-windows server 2008 provide?

Answers

35 millions folders windows servers

If using the md5 hashing algorithm, what is the length to which each message is padded?
a. 32 bits
b. 64 bits
c. 128 bits
d. 512 bits

Answers

If using the MD5 hashing algorithm, the length to which each message is padded 512 bits.

Answer: (d.) 512 bits.

MD5 stands for Message Digest 5. It is a hashing algorithm that is case sensitive.  It is a cryptographic hash values.

Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and then average the digits. You must use a while loop and % to access each of the individual digits. Use / to reduce the number so that you can average all of the digits.
Example: num = 123 can be taken apart with tempNum = 123 % 10 (which will pull off the 3), then tempNum = tempNum / 10 (will result in 12). Do this in a loop while the number is > 0.

Sample Data :
234
10000
111
9005
84645
8547
123456789


 Be sure to include print statements that will format the output as below.

Sample Output :
234 has a digit average of 3.0

10000 has a digit average of 0.2

111 has a digit average of 1.0

9005 has a digit average of 3.5

84645 has a digit average of 5.4

8547 has a digit average of 6.0

123456789 has a digit average of 5.0

Answers

For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
Here is my solution:

import java.lang.System.*;

public class DigiMath {   

private static int countDigits(int number)
{
       int sum = 0;
       while(number > 0)
       {
           sum ++;
           number /= 10;
       }       return sum;   
}

private static int sumDigits(int number)   
{       
      int sum = 0;       
      while(number > 0) {
           sum += number % 10;
           number /= 10;
       }
       return sum;
}
   
   public static double averageDigits( int number )
   {
       int count = countDigits(number);
       if (count > 0) {
           return (double)sumDigits(number) / (double)count;      
       } else { 
            return 0; 
       } 
   }
   
   public static void PrintDigitAverage(int number)
   {
       System.out.printf("%d has a digit average of %1.1f\n", number, averageDigits(number));
   }
   
   public static void main(String[] args) 
   {
       // Method tests (run with java -ea)
       assert countDigits(12345) == 5 : "countDigits returns wrong count";
       assert sumDigits(12345) == 15 : "sumDigits returns wrong sum";
       assert averageDigits(12345) == 3.0: "averageDigits returns wrong average";

        PrintDigitAverage(234);
        PrintDigitAverage(10000); 
        PrintDigitAverage(111); 
        PrintDigitAverage(9005); 
        PrintDigitAverage(84645); 
        PrintDigitAverage(8547); 
        PrintDigitAverage(123456789);
   }
}


In the dns naming convention, what character(s) separate(s) a domain name from its subdomains?

Answers

In the dns naming convention, the domain name separates the sub-domains by "DOT" (.) character.

DNS or Domain Name System is written in a conventional method as Host. Domain. Root. This system allows only 255 characters while naming a domain that also includes the spaces in between. Sub-domain is the part of a large domain.

What coding scheme is used by most microcomputers?

Answers

The answer to your question is ISYS

a. True
b. False: the arguments in a module call and the parameters listed in the module header must be of compatible data types.

Answers

True ? They have to be of the same type, comatible isn't absolute enough. But I may be overthinking it.

_____ rows indicate that there is different formatting for odd and even rows.

Answers

Banded rows indicate that there are different formatting for odd and even rows.

You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice that the board has four dimm slots

Answers

The three yellow slots probably indicate triple channeling, which means the board uses DDR3 DIMMs. To know for sure, remove a DIMM and look for the position of the notch on the DIMM.

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?

Answers

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield? A coaxial cable.

Final answer:

A coaxial cable is described, featuring a center core surrounded by an insulating spacer and a braided metal shield to reduce electronic noise, commonly used in audiovisual connections.

Explanation:

The type of cable described is known as a coaxial cable. It consists of a center core inner conductor typically made of copper, which is surrounded by a dielectric insulating spacer material. This assembly is then protected by a braided metal shield or outer conductor, which can help guard against electromagnetic interference (EMI). The entire cable is often encased in an insulating jacket. Coaxial cables, such as the RG-59, are popular in applications requiring the reduction of electronic noise like cable TV or audiovisual connections in homes and businesses.

The ____________ method can be used to convert a string to an int.

Answers

parseInt()





----------------------------

Which does an icon on the desktop signify?

A.a program

B.a file

C.a folder

D.all of these

Answers

I believe that the answer is D. 
On a desktop the icons for files, programs and folders can all be present.

A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.

Answers

local






----------------------------------------------------

You have a new web app and the host for it is going to provide storage for your data on their server. what is this called

Answers

The answer is Cloud storage. When a host provides storage space for your data on their servers it is called Cloud storage. Cloud storage is known as a cloud computing model wherein thousands of data is stored on different remote servers, which can be accessed from the internet itself.

Which of the following best describes a situation where software should be upgraded or replaced ?

Answers

It should be a 6-year computer that needs a new cPU to run latest video software.  Usually when software can't run, the computer needs an upgrade.  The other three options would be replace.  The first obviously needs to be replaced.  The second would cost too much to upgrade, and would be more logical to replace if you're only needing an extra 25% cost for a brand new computer than an upgrade. The last one needs more RAM upgraded, but it's not a software issue or a software upgrade.  It would be a RAM upgrade

Shoutout to @Dogmama89 

Have an amazing day!

Answer:

d

Explanation:

Other Questions
Amy, who is 17 years old, is 5 years older than twice Moe's age.Write an equation that you could solve to find Moe's age. Solve the equation and describe your steps. what degree of rotation will cause the triangle below to map onto itself i need it assapWhich describes interactions between substances and stomata during photosynthesis? Check all that apply.Oxygen enters stomata.Oxygen is released through stomata.Carbon dioxide enters stomata.Carbon dioxide is released through stomata.Hydrogen enters stomata.Hydrogen is released through stomata. what caused the Americans to not continue to attack the British outside of Philadelphia after the British retreated for the first time. Starvation Lack of confidence Weather Fear A ________ paraphrase focuses attention on the denotative meaning of a message. The ratio of students to teachers at a school is 19:1 how many students are there in each total of people?A.100 people B.280 C.440 D.760 Is shay ran that last lap like a gazelle a metaphor In Shakespeare's The Tempest, Prospero's dukedom is taken from him, and he is set adrift. Gonzalo, however, provides him with not only clothing and food, but also books Prospero "prize[d] above [his] dukedom." Prospero then proceeds to teach both Miranda and Caliban from his books and to take charge of the island.This backstory illustrates which two central themes in the play?A. The desire to rule and the value of knowledgeB. Betrayal and the difficulty of distinguishing heroes from monstersC. The power of the supernatural and the value of travelD. The imperialist attitude and the questionable value of freedom After reviewing The Great Indian Debate, use the information provided in the quotes to compare and contrast Mary Rowlandsons characterization of Native Americans with Benjamin Franklins characterization What is 1/2 x 2/3 x 3/4 What was the letter in Macbeth about Ustedes __________ (hablar) con mi amiga Elena. I am confused on how this table works How does queen elizabeth manage to reign during a time of sharp religious difference in england? Daniel webster believed that states were superior to the national, federal government? how did the Kansas-Nebraska Act undo the Missouri Compromise in sonata for harp and bicycle when jason and mrs golden discuss a plan to go back into the building it is what stage in the plot diagram What tone does this passage convey? Natasha had a great attitude, and her teachers and classmates noticed that she was always smiling. Even when she did not do as well as she had expected, Natasha told herself that she would do better next time. Her friends were impressed by how positive she was. humorous optimistic pessimistic angry What is the domain of the function y= square root of x-10 Scientific ideas from the scientific revolution and political ideas from the enlightenment led to a period of social upheaval and ____________.a. colonial expansionb. violent changec. political isolationismd. absolutist monarchs Steam Workshop Downloader