1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
7

What are three reasons teens might start drinking alcohol??

Computers and Technology
2 answers:
vampirchik [111]3 years ago
3 0
1. Social Media Influence (ex; influence by videos on snapchat, youtube or Tv)

2. Peer pressure (but that mostly falls into the same category as 1), so another reason could be "Teenage rebellion" in todays society we see everywhere that it is expected for teens to act up and experience things such as underage
drinking. 

3. Influence at home! Believe it or not a lot of parents will allow their teens to drink at home and/or invite their friends over and provide them alcohol because "they rather have the teens do it at their house than the kids hiding that from the parents" <span />
gavmur [86]3 years ago
3 0
There are many reasons why teens might start drinking alcohol. every teen different so each person has there own reasons. One reason could be peer pressure every teen is trying to fit in or trying to be cool so when they see their friends and classmates drinking they want to fit in and if they reject students will usually laugh at them or bully them.

Another reason could be self-medication. teens go through daily struggles and can't talk about their personal issues so they try to find another way to escape this isn't just for teens many adults do this. Also many teens suffer depression and anxiety so they drink to numb the pain or at least ease the pain.

The third reason could  be rebellion. teens love going against their parents especially during there teens years and they feel like they know everything and they think they know whats best so when strict parents tell them do anything they will do the exact opposite. Lastly  so teens might just love to party and might just drink for fun and some might get addicted to alcohol and can't stop drinking. 

Hope this helps

can you please make this the brainiest question 

Thank you :)

You might be interested in
During which step of the problem-solving process would group members combine and elaborate on ideas? Define the problem. Analyze
slava [35]

In a problem-solving process occurring inside a group, (C) develop creative solutions would be where the members combine and elaborate on ideas.

Brainstorming would be a prominent feature during this process since group members would be encouraged to state her or his opinion and solutions about the problem that the group needs to solve.

5 0
4 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
3 years ago
Write a function that receives two numbers, m and n and calculates and displays the sum of the integers from m to n. For example
Evgesh-ka [11]

Answer:

The program to this question as follows:

Program:

//header file

#include <stdio.h> //defining header file

void inc(int m,int n) //defining method inc

{

   int sum, i; //declaring variable

   sum=m; //holding value of m variable

   for(i=++m;i<=n;i++) //loop for calculate number between given range  

   {

   sum=sum+i; //adding value

   }

   printf("sum of the integer is : %d",sum);//print value

}

int main() //defining method

{

   int m,n; //defining integer variable

   printf("Enter m value: "); //message

   scanf("%d",&m); //input value by user in variable

   printf("Enter n value: "); //message

   scanf("%d",&n);//input value by user in variable

   inc(m,n); //calling method

   return 0;

}

Output:

Enter m value: 3

Enter n value: 7

sum of the integer is :25

Explanation:

In the above code, an "inc" function is declared, that accepts integer parameters that are "m and n", inside the method two integer variable "sum and i" is declared, which is used in the loop.

  • The loop uses the user parameter to count value and uses the sum variable to calculate there sum.
  • In the main method, two integer variable n and m are declared, which take value from the user end, and at the last, we call the inc method, that prints sum value.
7 0
3 years ago
2. Feet to Inches One foot equals 12 inches. Design a function named feetToInches that accepts a number of feet as an argument,
MariettaO [177]

Answer:

See the below the answer written in Matlab

Explanation:

function inches=feetToInches(feet)

prompt='enter the value of feet in digits';

feet=input(prompt)% ask for the value in feet that needs to be converted to inches

inches =feet*12; % converts feet to inches

x=['the value in inches is:  ',num2str(inches)];

disp(x) %display the result of the convertion

end

8 0
3 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
3 years ago
Other questions:
  • As yall know its spoopy season. This means spoopy music! I am having a live stream on the Spoon app under the username teendrago
    11·1 answer
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • Which tasks can Kim complete using the Customize Ribbon dialog box? Check all that apply.
    14·1 answer
  • What is data? and types ??
    9·2 answers
  • What is the correct process for selecting an entire row in a spreadsheet?
    10·1 answer
  • Which of the following “invisible” marks represents an inserted tab?
    11·2 answers
  • A local variable that is declared as ____ causes the program to keep the variable and its latest value even when the function th
    10·1 answer
  • Which of the following popular presentation software items do you have to purchase in order to use?
    11·2 answers
  • What is a simulation?
    5·2 answers
  • Where does change management play a major role in transforming a client
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!