1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
11

Is the following an example of social media viral marketing? Indicate your response by selecting yes or no. When you sign onto y

our favorite social networking website, you get messages from friends who have seen a television show they thought was a "must see!"
Computers and Technology
1 answer:
Vladimir [108]3 years ago
3 0

Answer

yo im sorry give me points b

Explanation:

gasefe

You might be interested in
This project involves writing a program that encodes and decodes messages. The program should prompt the user to select whether
Lilit [14]

Answer:

See explaination

Explanation:

import java.util.Scanner;

public class EncodeDecodeMessage {

public static String encode(String str) {

String result = "";

char ch;

for(int i = 0; i < str.length(); ++i) {

ch = str.charAt(i);

if(Character.isLowerCase(ch)) {

result += (char)('a' + (25-ch+'a'));

} else if(Character.isUpperCase(ch)) {

result += (char)('A' + (25-ch+'A'));

} else {

result += ch;

}

}

return result;

}

public static String decode(String str) {

return encode(str); // since the scheme is same, we can use encode for decode

}

public static void main(String[] args) {

Scanner in = new Scanner(System.in);

System.out.print("1. Encode, 2. Decode. Enter your choice: ");

int choice = in.nextInt();

in.nextLine();

if(choice == 1) {

System.out.print("Enter sentence to encode: ");

String line = in.nextLine();

System.out.println("Encoded string is: " + encode(line));

} else if(choice == 2) {

System.out.print("Enter sentence to decode: ");

String line = in.nextLine();

System.out.println("Decoded string is: " + decode(line));

}

}

}

8 0
3 years ago
A server-side extension ________________. provides its services to the web server in a way that is totally transparent to the cl
damaskus [11]
A: provides its services to the Web server in a way that is totally transparent to the client browser.
8 0
4 years ago
An expression which combines variables numbers and at least one operation
hichkok12 [17]

Answer:

An "Algebraic expression" is the correct answer for the above question.

Explanation:

  • The algebraic expression is an expression that is written in the form of alphabets and numbers. For example x+2x.
  • And it is also calculated with the consideration of alphabets like X+2X will be 3X.
  • The above question asked about the expression which is used with the combination of alphabets or variables and the numbers. That expression is known as "Algebraic expression"
4 0
3 years ago
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
4 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Other questions:
  • How to access files on different computer same network
    14·1 answer
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • Name some technologies that engineers create
    13·1 answer
  • Where can you find gradpoint answers
    13·2 answers
  • How does technology improve convenience, but impact our privacy?
    8·1 answer
  • Who ever likes Pokemon an wants to help me please comment and I will Give the room for My Assignment
    9·1 answer
  • I am bad with excell pleasee heelp
    15·1 answer
  • Someone please tell me please y my ps4 controller won’t charge:(
    12·2 answers
  • Compiler is an example of​
    5·1 answer
  • What is the main purpose of a web crawling program
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!