1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
2 years ago
14

People can use social media responsibly by what​

Computers and Technology
2 answers:
Otrada [13]2 years ago
5 0

Answer:

spread love not hate n password diligent

OLga [1]2 years ago
5 0

By limiting their time on social media

Explanation:

You might be interested in
Hi i need help with something:(
AleksandrR [38]

Answer: what do  you need help with?

Explanation:

4 0
2 years ago
Read 2 more answers
Please post detailed answers to the following questions. Please use complete sentences.
Aloiza [94]

Please post detailed answers to the following questions. Please use complete sentences t two artists from the following list: Phil Borges,Lee Jeffries.

<h3>What are photography opportunities?</h3>

The taking of constant or nevertheless snap shots furnished a brand new medium with which to seize reality, and modified the manner humans in general, and artists in particular, noticed the arena and created new inventive opportunities. Learning from the technological know-how of photography, artists evolved a selection of the latest portrayal techniques.

Photography modified our imaginative and prescient of the arena with the aid of using presenting greater get entry to to greater snap shots drawn from greater locations and instances withinside the global than ever before. Photography enabled snap shots to be copied and mass-distributed. The media-sphere became burgeoning.

Read more about the internet :

brainly.com/question/2780939

#SPJ1

4 0
2 years ago
What are the two types of disks that make up tiered storage?
Andrej [43]
Tiered storage is an underlying principle of ILM (<span>information lifecycle management</span>). It is a storage networking method where data is stored on various types of media based on performance, availability and recovery requirements. For example, data intended for restoration in the event of data loss or corruption could be stored locally -- for fast recovery -- while data for regulatory purposes could be archived to lower cost disks.
6 0
3 years ago
Two character strings may have many common substrings. Substrings are required to be contiguous in the original string. For exam
ryzh [129]

Answer:

Explanation:

The following function is written in Java. It takes two strings as parameters and calculates the longest substring between both of them and returns that substring length.

import java.util.*;

class Test

{

   public static void main(String[] args)

   {

       String X = "photograph";

       String Y = "tomography";

       System.out.println(X + '\n' + Y);

       System.out.println("Longest common substring length: " + longestSub(X, Y));

   }

   static int longestSub(String X, String Y)

   {

       char[] word1 = X.toCharArray();

       char[] word2 = Y.toCharArray();

       

       int length1 = X.length();

       int length2 = Y.length();

       int substringArray[][] = new int[length1 + 1][length2 + 1];

       int longestSubstringLength = 0;

       

       for (int i = 0; i <= length1; i++)

       {

           for (int j = 0; j <= length2; j++)

           {

               if (i == 0 || j == 0)

                   substringArray[i][j] = 0;

               else if (word1[i - 1] == word2[j - 1])

               {

                   substringArray[i][j]

                           = substringArray[i - 1][j - 1] + 1;

                   longestSubstringLength = Integer.max(longestSubstringLength,

                           substringArray[i][j]);

               }

               else

                   substringArray[i][j] = 0;

           }

       }

       return longestSubstringLength;

   }

}

8 0
3 years ago
Naomi wants to search for online courses on web development she types this term in the address bar which browser allows her to u
natka813 [3]
Google Chrome browser
4 0
3 years ago
Other questions:
  • What is the full meaning of ICT
    14·2 answers
  • Peripherals can be used to input information. True False
    6·2 answers
  • Easy STEAM question :)
    15·2 answers
  • Given that ∠XQR = 180° and ∠LQM = 180°, which equation could be used to solve problems involving the relationships between ∠XQM
    6·1 answer
  • For the block of 400 addresses, what is the length of the net id? njit
    12·1 answer
  • Threads can only be added to cylindrical faces.<br> O True<br> O False
    5·1 answer
  • For each entity, select the attribute that could be the unique identifier of each entity.
    12·1 answer
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • Given the number of rows and the number of columns, write nested loops to print a rectangle. (PYTHON)
    15·2 answers
  • Which input and output pair is correct for a bicycle?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!