1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
6

How does LinkedIn differ from other popular social media platforms? What are the similarities?

Computers and Technology
1 answer:
Anastasy [175]3 years ago
5 0

These are some of the best socail media sites. At  one point they are all same but different in the designing. Watch this video and explore more on this site about your topic....

https://playtube.pk/watch?v=KadIcPiw9lU

You might be interested in
How can random numbers in a range be generated in Java?.
Ksju [112]

Answer:

Java oh Na Na my  

Explanation:

5 0
2 years ago
How to scan a screenshot on Brainly?
yulyashka [42]

Answer:

You go to the option that says "snap to solve" an that's it

5 0
2 years ago
Read 2 more answers
What are rules that enforce basic and fundamental information-based constraints?
irga5000 [103]
The
answer should be C.
8 0
3 years ago
Which question best helps a reader understand a plot’s exposition? What will life be like after the character takes action? How
malfutka [58]

Probably (Who is the main character of the story?)  because exposition " introduces the characters, describes the setting and establishes the problem in the story."  Is this helpful?

7 0
3 years ago
Read 2 more answers
4. Give name=
Svet_ta [14]

Answer:

What does Bob [1] return?

What about Bob[-2]?

What about Bob[1:-1]?

How to get the length of Bob?​

Explanation:

8 0
3 years ago
Other questions:
  • Write a MIPS assembly language program that prompts for a user to enter how many floating point numbers to enter, then prompts t
    10·1 answer
  • 10 10 105 Each process is assigned a numerical priority, with a higher number indicating a higher relative priority. In addition
    8·1 answer
  • What is the purpose of lookup tables in spreadsheet software
    13·2 answers
  • The term integration refers to the ability to
    6·1 answer
  • Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
    11·1 answer
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • Dit View
    5·2 answers
  • Whats the wire that connects to the wifi box
    15·2 answers
  • Write a Java application that uses the Math class to determine the answers for each of the following: a. The square root of 37 b
    10·1 answer
  • Hai<br> ill give 100 point if some won answers dis
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!