1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
8

How do mass and social media differ

Computers and Technology
1 answer:
vredina [299]3 years ago
5 0

Mass media and social media differ in a few different ways. Understanding the differences between these two types of media will come in handy when you begin to brand your business.

Explanation

Mass media includes everything that is seen on the network news or what is read on magazines and newspapers. It puts its audience in a position where they are not able to respond to the information presented to them, but instead, allow what is presented to them without offering reactions. Social media, on the other hand, puts its audience at the center of everything. It allows them to collaborate and interact with people they know and often, people they do not know or have never met.

Access to electronic devices such as phones and tablets makes it easier for us to communicate and makes us become what I would call real time broadcasters. It is a good thing but often comes with challenges. Social media does not safeguard against lies, harassment, or the existence of fake news. Mass media, on the other hand, is controlled and have editors and people who have done extensive research before putting information out there.

Learn more about social media and how it impacts international marketing

brainly.com/question/12607702

#LearnwithBrainly

You might be interested in
Which resource helps a user access a cloud service?
Gala2k [10]
The answer is computer networking.
6 0
3 years ago
Read 2 more answers
What is a burned edge ?
scoray [572]

Answer: IT IS A DARK FEATHERED EDGE AROUND AN IMAGE

Explanation:

8 0
4 years ago
Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
solong [7]

It should be noted that data can be secured when working in the following way:

  • Establishing a cyber security policy.
  • Using two-factor authentication.
  • Keeping passwords strong.
  • Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

brainly.com/question/10091405

6 0
3 years ago
A technician has verified that a video card to be added to a desktop machine will fit and so will a new sound card. What should
yaroslaw [1]

Answremove the old sound and video card

Explanation:

for them to be able to be installed you have to get rid of the one that your trying to replace

7 0
4 years ago
What is the difference between margin and padding property?
VMariaS [17]

Answer:

Margin is applied to the outside of your element hence affecting how far your element is away from other elements.

Padding is applied to the inside of your element hence affecting how far your element's content is away from the border.

Explanation:

Hope it helps!!!

6 0
2 years ago
Other questions:
  • "a web server that is​ specially-built to manage and deliver business intelligence is called a​ _________."
    7·1 answer
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • Technician A says one disadvantage of fiber optic cables is that they are more expensive and very heavy. Technician B says one d
    6·1 answer
  • Regularly Tuning up a computer can assist keeping it running at Peak speed. True or False?
    12·1 answer
  • How do I do the matrix falling code on command prompt? Need Help?!
    14·1 answer
  • Hey guys i need help again on coding
    7·1 answer
  • Why do we use antivirus program?<br><br>please tell fast​
    12·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • 2.
    9·1 answer
  • Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!