1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
8

Which of these is an off-site metric for social media marketing?

Computers and Technology
2 answers:
astraxan [27]3 years ago
5 0

I just took the test its C the number of followers on Twitter.


Fudgin [204]3 years ago
3 0
I will have to say c




You might be interested in
Information security is defined as practice of preventing unauthorized access, use, disclosure, disruption, modification, or ___
Elena-2011 [213]

Answer:

destruction

Explanation:

destruction is also the property of information in which unintended users sabotage the information so that it becomes useless for both the owner and the user as well.

5 0
3 years ago
This program will demonstrate nested loops. Create a Java program that asks for a number of orders to process and use a loop to
podryga [215]

Answer:

there a website you can see a picture it wont let me send you a link sorry

3 0
4 years ago
How is a most recent variable different from a fixed variable
rusak2 [61]

In this program, there are three variables: data, count, and value. In the first loop, a user is requested to enter the number of values to be later processed in the second loop. This number is requested repeatedly until the user gives a positive value. The variable data is used to store the latest input read, and there is no possibility for the program to guess what values the user will enter.

The variable value is used similarly in the second loop: it stores the latest input, and there is no known relation between its successive values.

The variable count, however, behaves very differently. Once it has been initialized its future values will be known exactly: it will step downwards one by one until it reaches its limiting value, i.e. zero.

In the following the variables data and value are said to have the role most-recent holder (as they store the latest value in some value succession - user input in this case), and the variable count is said to be a stepper. These roles occur in programs again and again. In fact, only ten roles are needed to cover 99 % of all variables in novice-level programs.

7 0
3 years ago
The number 1 represent what state in binary code
love history [14]
True, is the state of a binary 1
6 0
3 years ago
1.a. EXPLAIN THE TERM LOGGING INTO A EMAIL ACCOUNT
liubo4ka [24]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Logging into an email account:

Logging into email account, that you are trying to login to your email account.

For example, if you want to login to g-mail , you give your user name and password, upon correct user name and password, the email management system will then allow you to login to your account, where you can see your  inbox, outbox, and other customized emails.

WRITE DOWN THE STEPS TO LOG IN AN EMAIL ACCOUNT

The following steps are used to log in an email account:

  1. Enter your email account URL in your browser or open the application of email. For example g-mail.
  2. Then enter your username and password
  3. Upon provision of right username and password, email system will direct you to login to your email account.

EXPLAIN THE TERM LOGGING OUT AN EMAIL ACCOUNT

The term logging out from an email account means that you are leaving your email account, and the email management system will ensure that no one tries to access your system and protect it from others. It is same like as you are protecting your files and folders and important data from other users  in your system while setting login and logout password.

4 0
3 years ago
Other questions:
  • The two ways to use the help menu is by searching of the contents or searching the _____
    13·2 answers
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • Casey, a woodworker, is developing his own website. He plans to use the site as a means of selling his handmade furniture. While
    10·1 answer
  • If you change a column header in your data source, what would you press to ensure that the data is synced as expected?
    11·1 answer
  • Write an application that allows a user to enter any number of student quiz scores, as integers, until the user enters 99. If th
    5·1 answer
  • Select the correct answer.
    7·1 answer
  • Cuáles son las partes más importantes de una flor​
    7·1 answer
  • Plsss help me plsssssss
    11·1 answer
  • Music = ("rap", "hip hop", "gospel")
    15·1 answer
  • Little round dots at the beginning of a line of text are called _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!