1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
8

Let’s say you attach four images to accompany an important tweet that you’ve composed in the Hootsuite Compose Box. On Twitter,

the images will appear in your audience’s stream as:
A) As thumbnails, which your audience can quickly expand at their discretion
B) Part of their Image Gallery
C) A series of 4 full size, but individual tweets (with the tweet copy appearing above the first image of the series)
D) A collage format, with full size images
Computers and Technology
1 answer:
Damm [24]3 years ago
6 0
I doub between:

<span>  C)  A series of 4 full size, but individual tweets (with the tweet copy appearing above the first image of the series)  D)  A collage format, with full size images</span>

You might be interested in
How many host ids does a /20 network support?
BlackZzzverrR [31]
2^(32-20) - one for the network number - one for the broadcast address = 4,094
5 0
4 years ago
Back in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the sho
tia_tia [17]

Answer:

Calvert Richard Jones

Explanation:

Just five years later, in 1846, the first known act of photographic retouching was performed by a Welsh colleague of Talbot's named Calvert Richard Jones, or perhaps by one of Jones's associates

6 0
3 years ago
Read 2 more answers
We write programs as a sequence of operation. they flow through the computer as?
lys-0071 [83]
I belive the correct answer would be binary code because computers see the coding as 00100001 
5 0
3 years ago
Describe the nodes in a 2-4 tree.
aivan3 [116]

Answer:

The node of the 2-4 tree can have at most three values.

There are basically 3 types of nodes in the 2-4 tree which are as following:-

  1. 2-Node.
  2. 3-Node.
  3. 4-Node.

2-Node:-It contains 1 data element and two child pointers.

3-Node:-It has 2 data elements and three child pointers.

4-Node:-It has 3 data elements and four child pointers.

There is also leaf node which can contain 2,3 or 4 data elements but has no child pointers.

4 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
Other questions:
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • Copy the 10 statements as they appear below into your journal.
    6·2 answers
  • A downloaded executable file may contain harmful software known as
    13·2 answers
  • True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
    14·1 answer
  • A loop that repeats a specific number of times is known as a(n):
    9·1 answer
  • If E=mc2 then what does F equal?
    10·1 answer
  • Can someone help me with this
    10·1 answer
  • Find the smallest value of n such that LCM of n is 15 is 45​
    5·1 answer
  • 8. What is the order of growth execution time of the push operation when using the LinkedStack class, assuming a stack size of N
    13·1 answer
  • A small square at the right corner of the table is what?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!