1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
7

What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over

Computers and Technology
1 answer:
lana [24]3 years ago
6 0

18-25 are the most growth in social media

You might be interested in
I need this done in c++ please.
MrMuchimi
Ok% your output is wrong maybe wrong change it
7 0
3 years ago
A ____ attack seeks to deny legitimate users access to services by either tying up a server's available resources or causing it
padilas [110]
I believe the answer is cyber attack.
3 0
4 years ago
An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref
Anika [276]

Answer:

Option 3 is the correct answer for the above question.

Explanation:

  • A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
  • It is used to make the file sort and can use for the transfer which takes some amount of memory.
  • The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
  • Option 1 states about the package manager which is used to manage the library only.
  • Option 2 states about the DBMS which is used to manage the database.
  • Option 4 states about the router which is used for the internet.

8 0
3 years ago
Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. W
Sliva [168]

Answer:

B. hub

Explanation:

Hub is a device that connects two or more computers together to make a Local Area Connection (LAN). It receives message and sends it to every computer on the network through a hub cables plugged into it from each computer. It enables each individual computer to partake in the message transfer process and each users can listen to the information. It is typically used at the centre of a star network and it is mostly regarded as an unsecured network.

6 0
3 years ago
Read 2 more answers
A newspaper runs stories that suggest that most people in the country support cutting taxes. After reading the stories, people w
Nataliya [291]

Answer:

Spiral of silence

Explanation:

The spiral of silence theory states that people remain silent regarding a topic when they feel that their views are in opposition with the rest of the majority.

As stated in the question, the newspaper's stories suggest that majority of the people support cutting taxes, this leads people who supoort raising taxes to not air their opinions because they think that everyone else supports cutting taxes like the papers say.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Which practice is the best option for desktop security?
    8·2 answers
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • Since the 1970s, local tv newscasts have developed a similar look. that's because
    9·1 answer
  • You work in the educational software industry. Your boss asks you to give a brief lecture to other employees about the digital d
    7·2 answers
  • The Institute of Electrical and Electronics Engineers (IEEE) is an organization that researches and institutes electrical standa
    15·2 answers
  • Which one of these is the range for a Class C address?
    12·2 answers
  • What are software applications?
    14·1 answer
  • What report indicates the last page users viewed before leaving a website?.
    10·1 answer
  • The amount of detail an image can hold is called it’s
    5·1 answer
  • Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better main
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!