1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
6

Importance of online social media etiquette​

Computers and Technology
1 answer:
Lostsunrise [7]3 years ago
4 0

Answer:

Social media is the most effective way to market your business. Etiquette is the difference between profit and loss. If you have a good intention to market your products and services online, then learn to speak to your visitors will be beneficial. Honestly, social media marketing is a full-time job because there are a variety of metrics to take into account and across many different social media platforms. The way you share your content, the content you share and how you talk and engage your audience is determined by the social media platform itself. Proper social media etiquette is a subset of proper manners. How you are perceived online will typically reflect on how you are perceived offline and in real life.

You might be interested in
The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
dolphi86 [110]

Answer:

def get_middle_ten(sentence):

   ind = (len(sentence) - 12) // 2

   return sentence[ind:ind + 12]

# Testing the function here. ignore/remove the code below if not required

print(get_middle_twelve("abcdefghijkl"))

print(get_middle_twelve("abcdefghijklmnopqr"))

print(get_middle_twelve("abcdefghijklmnopqrst"))

7 0
3 years ago
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
What does the following code do? Assume list is an array of int values, temp is some previously initialized int value, and c is
BigorU [14]

Answer:

Option D is correct.

Explanation:

Option D is correct because  when the condition  if (list[j] < temp) is tested it only gets true when element in list[] array at <em>jth</em> position is less than the value in <em>temp</em> and after that it increments the value of c by this statement: c++ and so c is incremented from 0 to as much times as much elements in list[] are lesser than temp.

6 0
3 years ago
Read 2 more answers
Visual basis,C, C++ and Java are all examples of computer programming ________.
mafiozo [28]
Programming languages im pretty sure
4 0
3 years ago
If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
monitta
The student should attempt to hold down the alt key, then enter 248 on the number pad and then release the alt key. Like so: °
5 0
3 years ago
Read 2 more answers
Other questions:
  • If reading or writing a cache line of size 64 bytes to Flash requires 2.56 μJ and DRAM requires 0.5 nJ, and if idle power consum
    9·1 answer
  • When shooting in a windy outdoor environment a ___should be placed over the mic
    7·1 answer
  • Will an email sent from a phone say it was sent from your phone
    5·2 answers
  • A web page typically contains ________, which contains the formatting instructions for displaying the web page.
    7·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    12·1 answer
  • you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t
    7·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • Edhesive 9.10 Question 3
    13·2 answers
  • Which type of information could be displayed using this line graph?
    12·2 answers
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!