1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
4 years ago
12

Consider that a large online company that provides a widely used search engine, social network, and/or news service is consideri

ng banning ads for the following products and services from its site: e-cigarettes, abortion clinics, ice cream, and sugared soft drinks. Which, if any, do you think they should ban? Give reasons. In particular, if you select some but not all, explain the criteria for distinguishing.
Computers and Technology
1 answer:
k0ka [10]4 years ago
7 0

Answer:

I think that they should ban ads for all four products.  These products, e-cigarettes, abortion clinics, ice cream, and sugared soft drinks, are all discreet adult products that should not be advertised because of their health hazards.  Since the "large online company provides a widely used search engine, social network, and/or news service, which are mainly patronized by younger people, such ads that promote products injurious to individual health should be banned.  Those who really need or want these products know where they could get them.  Therefore, the products should not be made easily accessible to all people.  Nor, should ads promote their patronage among the general population.

Explanation:

Advertisements create lasting and powerful images which glamourize some products, thereby causing the general population, especially children, to want to consume them without any discrimination of their health implications.  If online banning is then contemplated, there should not be any distinguishing among the four products: e-cigarettes, abortion clinics, ice cream, and sugared soft drinks.

You might be interested in
Difference between TIFF and BMP
Lina20 [59]

Answer:

Both TIFF and BMP are bitmap files, but TIFF files contain tags with additional information, like color space, resolution and print size, and can have 16-bit/channel depth (BMP's are limited to 8 bit). Taking a step back, there's no significant problem with first-generation JPEG files which use moderate compression.

Explanation:

4 0
3 years ago
What is the part of a file, the .pptx, or .txt etc called?
Lunna [17]
It is called the file extension or filename extension. It is a suffix that indicates the file format.
7 0
4 years ago
Read 2 more answers
Voip uses ________ technology similar to email to transmit voice over the internet.
azamat
Voice Over Internet Protocol
7 0
3 years ago
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
What kind of information could reasonably be expected to cause serious damage
Eddi Din [679]

Answer:

it could be getting in a car crash

Explanation:

6 0
3 years ago
Other questions:
  • When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
    7·1 answer
  • Which Command Prompt commands in Windows is used for listing a computer connections to shared resources
    10·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • Will sum1 come bust me outta FCA....replies u gotta live in knoxville though
    13·2 answers
  • C++ Fibonacci
    5·1 answer
  • Design and implement an application that reads an integer value representing a year from the user. The purpose of the program is
    6·1 answer
  • We have a combinatorial logic function that can be decomposed into three steps each with the indicated delay with a resulting cl
    15·1 answer
  • A computer has the following parameters Operation Frequency Cycles Arithmetic/Logical instructions 65% 1 Register load operation
    11·1 answer
  • What does this symbol “=“ mean
    8·2 answers
  • In which situation is coauthoring of presentations primarily utilized?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!