1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
11

So I’m doing a PowerPoint of how social media changed my life any ideas what I should right down and what kind of topics should

I put in 7 slides
Computers and Technology
2 answers:
lubasha [3.4K]3 years ago
5 0
I would put down how you were able to connect with people from diverse backgrounds and how you developed empathy.
Ludmilka [50]3 years ago
4 0

say how its impacted the way you see yourself based on the social stigmas of social media... how it changed the way you see other people... then how its helped you gain knowledge about places around the world by seeing raw content from that area... That's all I got, hope it helps :)

You might be interested in
The purpose of the 3030 gas dehydration unit
kozerog [31]

Answer:

Explanation:

Glycol dehydration is a liquid desiccant system for the removal of water from natural gas and natural gas liquids (NGL). It is the most common and economical means of water removal from these streams.[1] Glycols typically seen in industry include triethylene glycol (TEG), diethylene glycol (DEG), ethylene glycol (MEG), and tetraethylene glycol (TREG). TEG is the most commonly used glycol in industry.[1]

8 0
2 years ago
a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
Tomtit [17]

A central issue in the Microsoft antitrust lawsuit involved Microsoft's integration of its internet browser into its windows operating system, to be sold as one unit is a practice that is known as: C. tying.

<h3>What is an operating system?</h3>

In Computer technology, an operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, in order to manage random access memory (RAM), software programs, computer hardware and all user processes.

Microsoft was involved in an antitrust lawsuit with respect to tying the integration of its internet (web) browser into its windows operating system (OS) such as Windows 7, 8, 10, etc., in order to sell them to end users as a single unit.

Read more on operating system here: brainly.com/question/22811693

#SPJ1

8 0
9 months ago
What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation
Alekssandra [29.7K]

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

4 0
3 years ago
A downloaded executable file may contain harmful software known as
mylen [45]

Answer:

A downloaded executable file may contain harmful software know as malware.

Further details:

Malwares:

Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.

Uses:

Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.

Answer details:

Subject: Computer and technology

Level: College

Keywords:

• Harmful software

• Malware

• Malware software

• Uses of malware

• Purpose of malware

Learn more to evaluate:

brainly.com/question/4997492

brainly.com/question/4010464

brainly.com/question/1754173

8 0
3 years ago
Read 2 more answers
Choose all the items that represent potential ways to find a job opening.
NeX [460]

Answer:

company website

Explanation:

4 0
2 years ago
Other questions:
  • Days of the week are represented as three-letter strings ("Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"). Write a javaScript f
    14·1 answer
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • What are horizontal and vertical page break? how and where are these inserted?​
    10·1 answer
  • modified true or false analyze each statement then write technical the statement is true the statement is false underline the wo
    6·1 answer
  • A financially stable person is able to:
    8·1 answer
  • Imagine that you just received a summer job working for a computer repair shop one of your first task is to take apart a compute
    14·1 answer
  • what impact of information communication technology have on the environment about electronic waste, use of electricity?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!