1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
3 years ago
8

Which of these is an off-site metric for social media marketing?

Computers and Technology
2 answers:
musickatia [10]3 years ago
4 0

I just took the test its C the number of followers on Twitter.


pickupchik [31]3 years ago
3 0
I will have to say c




You might be interested in
Given an char variable last that has been initialized to a lowercase letter, write a loop that displays all possible combination
Amanda [17]

Answer:

for (char outerChar='a'; outerChar<='e'; outerChar++){

for (char innerChar='a'; innerChar<='e'; innerChar++){

cout << outerChar << innerChar << "\n";

}

}

5 0
4 years ago
Please help me with this!
Aleksandr [31]

def zipZapZop():

   number = int(input("Enter the number: "))

   dictionary = {3: "zip", 5: "zap", 7: "zop"}

   amount = 0<em> #amount of non-divisible numbers by 3, 5 and 7</em>

<em>    for key, value in dictionary.items():</em>

       if(number%key == 0): <em>#key is the number</em>

           print(value) <em>#value can be or zip, or zap, or zop</em>

       else: amount += 1 #the number of "amount" increases every time, when the number is not divisible by 3, or 5, or 7

   if(amount == 3): print(number)    <em>#if the number is not by any of them, then we should print the number</em>

zipZapZop()

4 0
3 years ago
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
4 years ago
Where was the first type of computer found
Dennis_Churaev [7]
The ENIAC was invented by J. Presper Eckert and John Mauchly at the University of Pennsylvania and began construction in 1943 and was not completed untill 1946. It occupied about 1,800 square feet and used about 18,000 vacuum tubes, weighing almost 50 tons.
8 0
3 years ago
Read 2 more answers
True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted
gizmo_the_mogwai [7]

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

7 0
3 years ago
Other questions:
  • In dt.py, you will implement a basic decision tree classifier for
    5·1 answer
  • The letters G,S and C are all examples of what Microsoft Word feature?
    12·1 answer
  • _____ is a feature that records the changes you make to a document.
    12·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • Write a program that asks the user how many numbers will be entered and then has the user enter those numbers. When this is done
    7·1 answer
  • Catherine purchased dried herbs from the grocery store. Which structure would she use if wanted to create a mixture of powdered
    8·2 answers
  • 1. Write a programme to print the Fees Receipt of English High School Required Inputs Name of the Student Monthly Tuition Fees M
    10·1 answer
  • 3. What of the following is the main components of computer system?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!