1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
12

True or false to join social network you create an avatar

Computers and Technology
2 answers:
frozen [14]3 years ago
3 0
The answer is FALSE.
The reason why it is false it is because not all social media websites provide avatars.
An Avatar is the manifestation,appearance or incarnation.In terms of social media in today's world your avatar is your identity.You choose to make your Avatar whatever you want it to be.It is what you project to others.Many people have different image online than in person.In social network it is a system that obliges virtual world symbols.
belka [17]3 years ago
3 0
<span>The answer is false. Avatar Social Network is a system that obliges virtual world symbols. It's been around for many years now. I initially made my record there in 2013 and afterward I blogged about it in 2014. As of late I've seen the site has had a touch of an overhaul and running easily so I figured it would be a decent time to advance it by and by. Likewise, a couple of my companions lost their facebook account again in light of their terms of administration so I figured this would be a decent option for those hoping to associate with other virtual world inhabitants.</span>
You might be interested in
Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
Ganezh [65]

Answer:

The correct answer to the following question will be "Adaptive Optics".

Explanation:

  • AO (Adaptive Optics) is a technique used to enhance optical system performance by reducing the impact of incoming gravitational wave distortions by compressing a mirror to compensate for the distortion.
  • It operates by calculating and compensating for defects in a wave-front with a system that corrects these errors as a deformable mirror or even a liquid crystal collection.
  • It is a technique that can make it possible for a single ground-based telescope to get images as clear as that of the Hubble Space Telescope.
  • Certain methods can achieve power resolution that exceeds the limit set by atmospheric distortion, for example, Aperture synthesis, Lucky imaging, and Speckle imaging.

Therefore, Adaptive Optics is the right answer.

7 0
4 years ago
If I execute the expression x &lt;- 4L in R, what is the class of the object `x' as determined by the `class()' function?
FinnZ [79.3K]

Answer:

integer

Explanation:

The expression can be implemented as follows:

x <- 4L

class(x)

Here x is the object. When this expression is executed in R, the class "integer" of object 'x' is determined by the class() function. R objects for example x in this example have a class attribute determines the names of the classes from which the object inherits. The output of the above expression is:

"integer"

Here function class prints the vector of names of class i.e. integer that x inherits from. In order to declare an integer, L suffix is appended to it. Basically integer is a subset of numeric. If L suffix is not appended then x<-4 gives the output "numeric". Integers in R are identified by the suffix L while all other numbers are of class numeric independent of their value.

7 0
3 years ago
A user left a comment. Which best describes where will it be seen?
skelet666 [1.2K]

The correct answer is "It will be highlighted in the text and seen in the right margin."

Comments are known as notes or annotations that gives an author or editor an idea about a common mistake in his or her work. In other words, comments are used to give a heads up to the creator of a specific document.

7 0
3 years ago
Read 2 more answers
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characte
Stels [109]
That would be your name and then you date of birth 
6 0
3 years ago
Read 2 more answers
____ can help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or c
FinnZ [79.3K]

Answer:

Network forensics

Explanation:

hide the most valuable data at the innermost part of the network.

5 0
2 years ago
Other questions:
  • If a given router can connect to at most k networks, how many routers, r, are required to connect n networks? write an equation
    7·1 answer
  • Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
    8·1 answer
  • Which name is given to a set of communications standards for simultaneous digital transmission of voice, video, data, and other
    6·1 answer
  • Blue light reduces quality sleep and comes from
    9·2 answers
  • Prompt the user for a character and the height of a right triangle. Then, print a triangle of that height using the character en
    11·1 answer
  • 15) When you buy an operating system for your personal computer, you are actually buying a software ________. A) copyright BE) u
    9·2 answers
  • 8. How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    6·1 answer
  • What's it called when a program is expandable?
    10·1 answer
  • Use the drop-down menus to select the type of goal described in each statement. I want to finish all of my social studies homewo
    14·1 answer
  • HOW TO CHANGE GRADE IN SKYWARD!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!