1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
10

What effect does social media have on teens?

Computers and Technology
2 answers:
dedylja [7]2 years ago
8 0

Social media can maybe make teens more addicted to their phones. They may start procastinating and forget to do their work. On the positive side, social media helps teens to connect with their friends and family

myrzilka [38]2 years ago
3 0

Answer:

manipulation is the answer

You might be interested in
Technology can cause a drop in input costs.<br> a. True<br> b. False
Marizza181 [45]
<span>True that technology can cause a drop in input cost. In a production process, there are three kinds of cost that called input cost, which are the direct material cost, direct labor cost, and overhead cost. Technology usage can make the production process more efficient by reducing labors included in the process. This condition leads to a cost reduction.</span>
6 0
3 years ago
Read 2 more answers
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
Ivahew [28]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

4 0
2 years ago
A Game Object must have a Transform<br><br> True<br><br> False
vovikov84 [41]

Answer:

Yes

Explanation:because,have to update there apps or games and change there characters

3 0
3 years ago
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
3 years ago
PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
kaheart [24]

D is the answer  motherboard is correct

3 0
3 years ago
Other questions:
  • Jason wants to open a program with the command prompt window. Which command should he type in the Run dialog box to open the com
    10·1 answer
  • Which of the following statements is true of ASCII code?
    12·1 answer
  • Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above,
    5·1 answer
  • You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
    11·1 answer
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • Write a function called show_info that takes a name, a home city, and a home state (a total of 3 arguments) and returns a full s
    12·1 answer
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • The best way to safeguard your document is to save it
    11·1 answer
  • PLS HURRRYYYYYY!1!1!1!1!1
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!