1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
9

Image

Computers and Technology
1 answer:
Marat540 [252]3 years ago
7 0

Answer:

This is related to the curiosity gap. What we know, we are never interested in, and what we don't know always attract us. Here, the first headline is Go Ahead and Play that, is not creating any curiosity as there is no indication what is there inside the video, apart from the message that it is a video game. Hence, curiosity is not induced. There should be a hint to create curiosity, and take advantage of the curiosity gap. However, in the second headline, it does hint that there can be something good for us, And hence, the advantage of the curiosity gap is being used. And we will click because of the curiosity. Hence, the second headline is a more appropriate one.

Explanation:

Please check the answer section.

You might be interested in
List at least 4 types of works covered by copyright law
Shtirlitz [24]

Answer:

musical works, dramatic works, literary works, sound recordings.

6 0
3 years ago
Choose the sentences that describe techniques of formatting text.
OLEGan [10]

I'm sorry if this answer has come to late.

Answer:

She opened her type tool and wrote in 'Happy Thanksgiving at the bottom of the image. She smoothed the edges of the text and changed its color. She then placed the text on a rug and tilted it to create an effect that showed as if the text was written on the rug.

Hope this helps!

8 0
3 years ago
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
You have to display or connect to network shares on remote computers. Which command-line utility will you use to accomplish the
Xelga [282]

Answer:

net use X: \\SERVER\Share

Explanation:

1. Connect securely to the remote computer or ensure you have access to it on the network

2. then follow the step below:

Where X: is the drive letter you wish to map the share to, and \\SERVER\Share is the UNC path to the share. This should make the share visible in My Computer and the command line as well like all other shares mapped through the GUI.

In order to later disconnect the share, you would use

net use X: /delete

8 0
3 years ago
Please help im not good at computer class ​
Veronika [31]

Answer:

W.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which presenter would most likely benefit from a custom slide show?
    10·2 answers
  • Computer programmers often use binary codes (strings of 1s and 0s) to write programs for computers. These codes are then changed
    6·1 answer
  • Which option correctly describes a DBMS application? A. software used to manage databases B. software used to organize files and
    7·2 answers
  • I wonder how world is created
    12·2 answers
  • What part of the code is a signal for the function to execute and pass back a value?
    11·2 answers
  • The default (preset slide layouts are set up in ____ orientation.
    15·1 answer
  • The instructions in the language of alice are contained on ____ which you can drag and drop into place to ____ new programs
    8·1 answer
  • Which of the following statements about the relationship between hardware and software is true? a) Hardware can be present in in
    9·1 answer
  • Would my phone still work if I snapped it in half?
    8·2 answers
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!