1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
2 years ago
7

The appropriate use of social media includes _____. having arguments with people with whom you disagree having arguments with pe

ople with whom you disagree identifying and hacking cyberbullies identifying and hacking cyberbullies having thought-provoking debates having thought-provoking debates having as many connections as possible having as many connections as possible
Computers and Technology
1 answer:
lesantik [10]2 years ago
3 0

An appropriate use of social media includes: C. having thought-provoking debates.

<h3>What is social media?</h3>

Social media refers to a collection of Internet software applications which are designed and developed so as to avail end users an ability to add, share and discuss different information, as well as enhance collaboration and debates between community members over the Internet.

In this context, we can logically deduce that having thought-provoking debates and making constructive posts are appropriate use of social media.

Read more on social media here: brainly.com/question/25546524

#SPJ1

You might be interested in
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
Maslowich
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
3 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run ti
katen-ka-za [31]
Cin >> input_value;
if (input_value > 5)
input_value = input_value + 5;
else if (input_value > 2)
input_value = input_value + 10;
else
input_value = input_value + 15;

The right answer is : 15
7 0
3 years ago
Companies use virtualization to do all of the following except:
dangina [55]

Answer:

c)

Explanation:

Virtualization refers to running a virtual instance of a computer system apart from the actual software. Companies use this virtualization to do all of the following except Reduce the amount of applications in corporate datacenters. Instead few systems have the applications and those systems are cloned through virtualization.

4 0
3 years ago
The development of various technologies led to many historic events. Use information from the Internet to describe one major his
kati45 [8]

Answer:

The Compass

Explanation:

The compass was one of the foremost technological inventions that forever changed sea navigation.

Before its invention, sailors used landmarks to navigate and when it got dark, they had to stop and wait for daybreak before resuming their journey. Some other people used the inaccurate means of the sun and stars to navigate at sea.

But with the invention of the compass, all these problems were a thing of the past because the compass could provide direction despite the weather or time of the day and as a result, it opened more trade routes and assisted in the Age of Discovery.

4 0
3 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • CHKDSK is a system utility that is commonly found in Windows. What is CHKDSK? Use the Internet to research and write about CHKDS
    15·2 answers
  • Write a C++ program that prompt the user to enter three points (x1, y1), (x2, y2), (x3,y3) of a triangle and
    14·1 answer
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this threa
    7·1 answer
  • Which is better computer science or software engineering?
    10·2 answers
  • ?__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting
    5·1 answer
  • Mikaya works in the planning department
    14·2 answers
  • During the first six months of his job, Enrique's boss gave him weekly feedback about his performance. What component of effecti
    9·1 answer
  • Any movie/show suggestions??
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!