1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
3 years ago
12

Which of the following technologies is an example of social media

Computers and Technology
1 answer:
LenKa [72]3 years ago
8 0

Answer:

Is there multiple choice? Since it says "which of the following"

Explanation:

Social media are certain apps where people are social, with others such ad friends and family. Apps are In.sta.gram, Snap.ch.at, Twitter, etc. Um.. if you put the choices down, I can help you better

You might be interested in
Letter only ^_____^!
vagabundo [1.1K]

b serves as food for the yeast

4 0
3 years ago
What do you think about the future of computers?​
Strike441 [17]

Answer:

what do i think about future of computers

Explanation:

i think the future of computer will more be advanced

maybe creating robots to help humans with lots of things as pollution,littering and all sorts of things help us explore deeper parts of the ocean and get more accurate data and maybe be able to stop climate change,maybe stop deforestation, and be able to fix all the horrible thing we did to our earth. this is not proven facts but this is how i think about the future of computer

Idk if that helps

8 0
3 years ago
balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
liubo4ka [24]

The balance exercises used for introducing balance training should initially involve little joint motion and improve the Reflexive (automatic) joint-stabilization contractions.

<h3>What is the main goal of balance training?</h3>

Balance training is known to be a kind of an exercise where a person that is doing the  exercises works out so as to strengthen the muscles that aids  them to keep to be upright, such as their  legs and core.

Note that  kinds of exercises are done so as to improve stability and help hinder falls.

Therefore, The balance exercises used for introducing balance training should initially involve little joint motion and improve the Reflexive (automatic) joint-stabilization contractions.

Learn more about balance exercises  from

brainly.com/question/16218940

#SPJ1

5 0
1 year ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
4
Nataly_w [17]

Answer:

5 hours 25 minutes

Explanation:

It takes 25 minutes to finish a hole

It takes 25*13 minutes to finish 13 holes

325 minutes is require to finish 13 holes

Convert 325 minutes to hours and minutes by dividing it by 60

=5 5/12 hours

Convert 5/12 hours to minutes by multiplying by 60

=25 minutes

The answer is 5 hours 25 minutes

5 0
4 years ago
Other questions:
  • Suppose that you created an robot that was so advanced it could act independently in very complex situations. It made its own de
    9·1 answer
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
    8·1 answer
  • Question 16 of 20
    12·2 answers
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the
    10·2 answers
  • What is a thoughtware​
    7·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!