1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
10

What effect does social media have on teens?

Computers and Technology
2 answers:
dedylja [7]3 years ago
8 0

Social media can maybe make teens more addicted to their phones. They may start procastinating and forget to do their work. On the positive side, social media helps teens to connect with their friends and family

myrzilka [38]3 years ago
3 0

Answer:

manipulation is the answer

You might be interested in
You have posted some embarrassing photos of a friend onto the Internet. After
e-lub [12.9K]

Answer:

C

Explanation:

4 0
3 years ago
A page layout technique that often uses a percentage value for width is called ________.
masya89 [10]
It is called a fluid layout

A fluid web page typically is configured with percentage widths that sometimes take up 100% of the browser. They will use relative units like percentages instead of pixels and will often fill the width of the page regardless of what the width of the browser might be. They keep the same spatial weighting to all elements and works fine on different sizes of screens of similar sort. They define each area of an image layout perfectly.  




4 0
4 years ago
( BRANLIEST)
Irina-Kira [14]

Answer:

A monitor is an electronic output device that is also known as a video display terminal <em><u>(VDT) or a video display unit (VDU). It is used to display images, text, video, and graphics information generated by a connected computer via a computer's video card. Although</u></em> it is almost like a TV, its resolution is much higher than a TV. The first computer monitor was introduced on 1 March 1973, which was part of the Xerox Alto computer system.

Older monitors were built by using a fluorescent screen and Cathode Ray Tube (CRT), which made them heavy and large in size and thus causing them to cover more space on the desk. Nowadays, all monitors are made up by using flat-panel display technology, commonly backlit with LEDs. These modern monitors take less space on the desk as compared to older CRT displays.

8 0
2 years ago
Read 2 more answers
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Which type of attack involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing th
mariarad [96]

The type of attack that involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing is known as Physical attack.

<h3>What is physical attack in computer security?</h3>

In a physical attack, this is known to be where an attacker is said to have physical access to any kind of physical asset in the area of the infrastructure system so that they can damage it, disable it, or others.

Note that based on the above, The type of attack that involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing is known as Physical attack.

Learn more about Physical attack from

brainly.com/question/11609218

#SPJ1

8 0
2 years ago
Other questions:
  • Which of these is important to consider before believing health or fitness information you find online? Where the information wa
    5·2 answers
  • Overcoming the fundamental attribution error requires making an effort to shift an external attribution into an internal attribu
    15·2 answers
  • A virus that propagates using the internet or another computer network is called __________.
    10·1 answer
  • One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.
    10·1 answer
  • i got a set of headphones and when i plug them into my speakers the right side only works how do i fix the left side of them
    12·1 answer
  • What type of object is a GUI widget the user can click to select an option, and allows for any number of these objects to be sel
    5·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • Define power supply and types of power supply<br>​
    11·1 answer
  • What allows a programmer to write code quickly and efficiently for an action that must be repeated?
    14·1 answer
  • You are planning to help students learn to program in Python. Some of the steps are below, but not in any particular order.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!