1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
2 years ago
10

In your own view, how can social media be used in teaching and learning in higher education?

Computers and Technology
1 answer:
g100num [7]2 years ago
4 0

Answer:

through the use of zoom to teach.And reading books online

You might be interested in
The first step in transforming an extended e-r model into a relational database design is to
zimovet [89]
You need to create a table for each entity, as the first transforming step for extending e-r model toward the relational design of database.
3 0
3 years ago
2.<br> Solve each equation.<br> a)<br> 3n - 8 = 2n + 2<br> b)<br> 4n + 75 = 5n + 50
Volgvan

Answer:

A) n=10

B) n=25

Explanation:

Mind marking me brainliest?

5 0
3 years ago
Which careers require completion of secondary education, but little to no postsecondary education? Mathematical Technicians and
Masteriza [31]

Answer:

Nondestructive Testing Specialists and Surveying Technicians

3 0
3 years ago
Read 2 more answers
Which section is optional in a resume?
suter [353]

<em>Career Objectives </em>are pointless in a resume, Things like experience, Contact details, education and skills, help the company decide whether to take you or not, in accordance with their needs. They don't need to know why you want the job as opposed to how you could help them.

7 0
3 years ago
How the (i)?? Help me to slove this
cupoosta [38]

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

4 0
2 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • has anyone noticed that brainly has been giving the wrong answers and that the ads are blocking answers or is that just me?
    7·2 answers
  • When executing System.out.println(a2), the toString() method in the Object class is invoked. The program cannot be compiled, bec
    11·1 answer
  • Cell A1 contains the formula "=10+D2". If you copied A1 to B3, what would be the formula in B3?
    10·2 answers
  • Why do you think Google+'s engagement levels are so low? Do you think they will rise as people become more familiar with the soc
    12·1 answer
  • What nuclear remediation site had their computers wiped clean by notpetya?
    15·1 answer
  • True false) cad means computer aided manufacturing​
    10·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • Which term originated on social media?<br> O A. LOL<br> O B. Unlike<br> O C. Notebook<br> D. Word
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!