1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
4 years ago
11

On what level has social media connected us to one another?

Computers and Technology
1 answer:
valentina_108 [34]4 years ago
3 0
4) on a global level.
You might be interested in
*URGENT!!* *100 POINTS!**9 questions for 100 points*
Lena [83]

Answer:last day of school

Explanation:

sorry, im looking for it as well

7 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic
Shalnov [3]

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

5 0
3 years ago
What is not a form of renewable energy
trasher [3.6K]
Coal and oil are not forms of renewable energy because they will eventually run out. Wind, water and solar power will never run out and are therefore renewable.
3 0
3 years ago
Jason works as a Help Desk Technician for uCertify Inc. The company has a Microsoft Windows XP-based network. Jason wants to vie
WINSTONCH [101]

Answer:

ipconfig

Explanation:

ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;

i. the IP address of the computer

ii. default gateway address

iii. subnet mask

iv. Media Access Control (MAC) address.

6 0
3 years ago
Other questions:
  • The key requirement in selection of the facilitator is one who is the end-user.
    8·1 answer
  • Suppose that a program performs an intermixed sequence of (stack) push and pop operations. The push operations put the integers
    9·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • Which is the best example of an unreliable narrator?
    15·1 answer
  • In a singing competition, there are 34 more men than women
    5·2 answers
  • "queries are questions", true or false?
    8·2 answers
  • Let cell E2 = 100, what is the result of this formula? =NOT(E2&lt;100) *
    13·1 answer
  • It would be at least two decades before some of
    12·1 answer
  • What I Can Do
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!