1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
13

Why do you think Jacinda believed what people told her about her own beauty? Even if you understand that what you see on social

media is not the whole story, does it influence how you think of yourself?
Computers and Technology
1 answer:
liubo4ka [24]3 years ago
8 0

Answer:

Well it's human behavior to be accepted amonst your own kind and the need to gain reputation as the body rewards you with stimuli for more of the "Like Button", this is a psycological nightmare knowing you are chained to your phone as you are afraid on missing out as your community or generation goes by as theres a whole lot of story behind jacinda, the image brought to me is enough to frame my own story about her.

You might be interested in
What is cpu????????????????????????????
Paul [167]

Answer:

CPU

Explanation:

CENTRAL

PROCESSING

UNIT

8 0
3 years ago
Read 2 more answers
The amount of data that can be stored on a disk depends in part on_____.
MariettaO [177]
To what it seems like, it’s d
8 0
3 years ago
What are the advantages and disadvantages of the simulated link strategy?
amid [387]

Answer:

The advantage of the simulated link strategy are:

  • It is easily able to provide the practical feedback to the customers and users while designing the whole system. It also determine the efficiency and the correctness of the design in the stimulated link strategy.
  • In the stimulated link strategy, the sharing and delivering of the data and information is done efficiently without any occurrence of error and interrupt. It is also high flexible technique.

The disadvantage of the simulated link strategy are:

  •   The simulated link strategy is flexible but it is not standardization and also it required more good concept.
  •  This technique is expensive and it is not readily available as it always require validation process.

3 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
What is the code for Pong that would work on Khan Academy?
Rashid [163]
Draw = function() {
if () {
if (keyCode === ){
();
}
else if (keyCode === ) {
();
}
}
};
7 0
3 years ago
Other questions:
  • One of the major disadvantages of application service providers (ASPs) is that they:
    6·1 answer
  • Select the strategies below that are likely to increase audience attention.
    14·2 answers
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • Write a Program in C language using arrays:
    14·1 answer
  • FS and GS are two___________________ in protected mode.
    14·1 answer
  • Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in
    9·1 answer
  • 2 (01.01 LC)
    5·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • The operating system provides a ____, which is the means with which you interact with the computer
    5·1 answer
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!