1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
14

What’s good and bad about having social media?

Computers and Technology
2 answers:
Leona [35]3 years ago
6 0
Something good about it is that you can express yourself and make friends or goals for yourself. Bad because you can get hated on, friends can leave you, you can get exposed, or you can get hacked or scammed
RideAnS [48]3 years ago
3 0
Good, for homework resources. Bad, hacking
You might be interested in
Using features on demand results in saving potentially significant amounts of disk space. features on demand becomes a third ins
larisa86 [58]
The answer is <span>Disabled with payload removed
The development is extremely crucial in the age where we contstantly receive access to overload of content.
Large hardisk means that we could store much more of the amount of data that we could put without compromising the performance.</span>
5 0
3 years ago
Which of the following is a group of email names and addresses used for mass distribution of a message?
Jet001 [13]

Answer:

Option D is the correct answer for the above question.

Explanation:

Email list (as the name suggests) is defined as the set of an Email address. It is also the group of address which is needs for message distribution because an Email address is the only necessary part to send the mail which is also called the message. When a user wants to send the mass Email or message then he needs a list of email which can be filled at the "TO" or "CC" or "BCC" part of the compose mail and it can be able to send the mass message.

The above question asked about the list which is useful for the mass message then the answer is an Email list which is stated from the option D. Hence option D is the correct answer while other is not because--

  • Option A states the actor list which is not required to send the mail.
  • Option B states the client list which is not required to send the mail.
  • Option C states the chat list which is not required to send the mail.
3 0
3 years ago
I am a bacterium. I cause stomach cramps and diarrhea. I am caused by eating rotten foods
ZanzabumX [31]

I think it's salmonella. : )

4 0
3 years ago
Read 2 more answers
Derive an expression for the boolean function L(a,c) whose output is 1 when the light would be on. Note that two of the switches
Naddik [55]

Answer:

Following are the solution to the given question:

Explanation:

Please find the graph image in the attachment file.

In the sequence, they recognize how modules are divided and elements were introduced in parallel. L(a,c) is thus going to also be

\to a*c + a'*c' = ac + a'c'

It allows, ideally, to bring a thumbs up.

3 0
3 years ago
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
4 years ago
Other questions:
  • The class Date has a single constructor that accepts the integer value: a month- (1 for January through 12 for December), a day
    13·1 answer
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • Meaning of page break​
    8·1 answer
  • Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num &g
    13·1 answer
  • Why is outfitting a workspace with video games in technology development company considered a strategic use of money
    8·2 answers
  • Video-sharing sites such as youtube and vimeo provide a place to post short videos called clips, true or false?
    10·1 answer
  • What is wrong with my code...
    9·1 answer
  • I NEED HELP, DO ASAP <br> Why do you have to adjust toys for different ages?
    11·2 answers
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!