1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
6

4. Why isn't it realistic to market a new product using promoted tweets?

Computers and Technology
2 answers:
erica [24]3 years ago
3 0

Answer:

Great question

Explanation:

is not realistic because nearly everyone doesn't even consider to look at the ad. Most people actually find it annoying when they are scrolling on their feed and all of a sudden an ad pops up.

LekaFEV [45]3 years ago
3 0

Answer:

The tactics cost hundreds of thousands of dollars to implement. ... In other words, not every tweet should be about how great your product is. Use at least one relevant hashtag each time you tweet.

Explanation:

Hope it's help

You might be interested in
While the economy of eastern Washington relies on farming, western Washington relies on technology.
Strike441 [17]
True- western Washington hosts modern technologies supporting both academic and co curricular activities
3 0
3 years ago
Read 2 more answers
What do secondary sources rely on for their analysis of events?
MariettaO [177]

Secondary sources are defined as <u>a form of document that includes information from another source to analyze an issue. </u>

When a researcher or writer wishes to cite a secondary source, it means they are using information from a primary source that is presented in another document which has cited it, <em>instead</em> of directly referring to the primary source.

Thus, it can be said that the best answer for the question above is (D) primary sources only, since secondary sources use this when analyzing the problem presented in their document.

7 0
3 years ago
Read 2 more answers
This website is using a security service to protect itself from online attacks.
uysha [10]

Answer:

yes it has an ssl certificate making it impossible to hack

3 0
2 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
Lynna [10]

Answer:

No, hackers can steal information from cookies. This many times depend on the type of cookies.

Cookies, by general definition, are programs embedded onto browsers which collect non-invasive information about our activities such so that it can adapt to our needs.

The type of information that a cookie collects depends on what type of cookie it is.

Session Cookies: These types of cookies only collect information about the movement of the user on the website such as pages visited, products that were examined (for e-commerce websites) and products/services that the user put in their cart.

These type of cookies are temporary and are deleted as soon as the browser is shut down.

Persistent Cookies:

These do the same thing that the Session cookies do only that they are more permanent and are stored in a text file even after the browser and the computer has been shut down.

It is these types of cookies that pose a threat. These type of cookies many store codes and passwords and log-in details which may be exploited by a hacker.

Cheers!

7 0
3 years ago
When composing an email message, why might you want to use the bcc field?
lesya [120]

Answer:to copy the email confidentiality

Explanation:

4 0
2 years ago
Other questions:
  • Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
    12·1 answer
  • What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
    7·1 answer
  • Together, what do the divisions of the DHSMV do?
    12·1 answer
  • Write a copy constructor for carcounter that assigns origcarcounter.carcount to the constructed object's carcount. sample output
    15·2 answers
  • Communication is used to satisfy instrumental goals, which means ________ .
    5·2 answers
  • Which of the following is an example of constructive criticism for a friend who speaks too softly?
    13·2 answers
  • What is it called to persist in trying to multitask can result in this; the scattering bits of one’s attention among a number of
    9·1 answer
  • Time
    6·1 answer
  • Why is there no window on dishwsher
    13·2 answers
  • Which of the following is ture?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!