Which of the following BEST describes the concept behind Web 2.0? Download Write Read-write Upload

Answers

Answer 1
Answer: Read-write is the term that best describes to the concept behind Web 2.0
Web 2.0 allows the users to interact with each other in the social medias and other sites. It is basically develop to emphasize the usability and interoperability of this website


Related Questions

Graduated licensing is desighed to introduce beginning drivers to driving?
You can use the ________ method to replace an item at a specific location in an arraylist.
_______ technology is used in many hospitals to verify that the correct medication is being dispensed to the applicable patient.
What is sent back after you sent FAFSA
Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer for a linked list. // Postcondition: The function f has done some computation with // the linked list, but the list itself is unchanged. What is the best data type for head_ptr in this function?

Text,Audio and graphic is entered into the computer usinga)A cpu
b)Output
C)Input
ICT Question​ asap pls help

Answers

Answer:

I think it's input, not sure tho

Jameelah has files all over her computer. Thus, it is often difficult for her to find the files she is looking for. How Jameelah correct this issue?.

Answers

Answer:

folders

Explanation:

it is a very good way to keep your desktop organized and keep tidy

You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?

Answers

You are using the Rudolph rule. The Rudolph rule is just simply highlighting something for it to be noticed. In example, circling 100 data points and you have circled the highest value. The highest value is being encircled and being highlighted. The answer to your question is Rudolph rule.

When an attacker attempts to get credit card numbers using telephone and voice technologies, it's calleda. Vishing
b. Telephishing
c. Phreaking
d. Voicing

Answers

Answer:

A. Vishing

Explanation:

The term 'Vishing' is a combination of  'Voice' and 'Phishing'.

Phishing is to get personal or confidential information (like credit card numbers) by pretending to be a trusted and enticing unsuspected individuals to provide their information, believing they're dealing with a reputable institution.

The question states the hacker is using telephone and voice technologies... so it's a voice version of the phishing.

What is the least effective way to create balance and flow in your life

Answers

Act on your emotions in the moment instead of thinking about them.

1. Explain how using assistive technology can promote healthy emotional and social development. Discuss how you think young children and teens may be affected and how the affects may extend into adult life

Answers

There are multiple advantages to using assistive technology. On an Emotional factor, it builds up the self-confidence of children w/ disability; they will be to do more and will be able to reach their full potential and makes them more independent. On a Social development factor, it helps them to be able to communicate, express and relate to people. This gives them the opportunity to be able to socialize and be part of the society. Highlighting these advantages, as a kid with disability, I think he/she will be able to achieve his goals in life as he grows old as he/she will be able to attend regular education and will be able to cope on how to handle his/her daily life. He/she will not be left out in her teen years as she is able to communicate with people with ease using the AT. And as an adult he will be more independent on managing his daily life.