1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
6

which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New

s
Computers and Technology
1 answer:
Pani-rosa [81]3 years ago
3 0
The correct answer is Graph Search for Daily News

This does not exist on Facebook, unlike the timeline and the activity log.
You might be interested in
Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
Mkey [24]

Answer: Predetermined Overhead Rate, Estimated Manufacturing Overhead and Annual Activity Level.

Explanation:

Generally speaking, manufacturing overhead is applied to production by means of a predetermined overhead rate, which is computed under the general formula of dividing estimated overhead rate by some measure of the annual activity level.

A predetermined overhead rate is usually calculated at the beginning of an accounting period. It is calculated by dividing the estimated manufacturing overhead by an activity driver (e.g machine hours).

5 0
3 years ago
Read 2 more answers
Essay about evolution of media shaped the values and norms of the society
snow_lady [41]

Answer:

Find the essay below.

Explanation:

Media refers to the several ways in which information is communicated to people in mass. Some channels through which such pieces of information are conveyed include; the newspapers, internet, television. The advent of media can be traced backed to the 15th century when the first printing press was produced by Johannes Gutenberg. This enabled the typing of books and newspapers which could reach a farther audience. The radio which is an important means of communication was invented early on in the 20th century and the first electronic television was invented in 1927. In recent times, the advent of the internet has made mass communication even much easier.

Prior to the evolution of media, communication to a large group of people was not easy and fast as we have it today. Communities gathered in their numbers to get information from a source. Emissaries were sent to deliver letters across great distances.

Today, a lot of changes have come along with the media which have also affected the values and norms in society. In African society, for example, styles of dressings have changed as trendy styles from the western world that are promoted by the media, have been adopted. Beliefs and ideologies which were mainly superstitious have been enhanced through the media to become more rational. Religion has also been affected as the traditional religions are not widely practiced while Christianity and Islam which find wide coverage in the media have been adopted. All of these give credence to the fact that media has shaped the values and norms in many societies.

4 0
2 years ago
What is the difference between coding with html and coding with python
dsp73

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

5 0
3 years ago
3 uses of a computer ​
GenaCL600 [577]

Answer:

online bills payment

watching movies or shows

home tutoring

3 0
2 years ago
Read 2 more answers
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Other questions:
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • Assume the existence of a Bank Account class. Define a subclass, Savings Account that contains the following: a double instance
    5·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • PLEASE HELP!! Kou converged his Word document to a PowerPoint document. When he received the PowerPoint, he was missing material
    12·1 answer
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • What are search tries? Why are they more efficient than usualsearching<br><br> algorithms?
    8·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • What is "mob of the dead"?
    7·1 answer
  • For a business that is properly using a social media information system, the system can
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!