1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
13

Why do you think Jacinda believed what people told her about her own beauty? Even if you understand that what you see on social

media is not the whole story, does it influence how you think of yourself?
Computers and Technology
1 answer:
liubo4ka [24]3 years ago
8 0

Answer:

Well it's human behavior to be accepted amonst your own kind and the need to gain reputation as the body rewards you with stimuli for more of the "Like Button", this is a psycological nightmare knowing you are chained to your phone as you are afraid on missing out as your community or generation goes by as theres a whole lot of story behind jacinda, the image brought to me is enough to frame my own story about her.

You might be interested in
In this era of technology, everyone uses emails for mail and messages. Assume you have also used the
ipn [44]

Answer:

A class may be a structured diagram that describes the structure of the system.  

It consists of sophistication name, attributes, methods, and responsibilities.  

A mailbox and an email message have certain attributes like, compose, reply, draft, inbox, etc.

Software architecture affects:

Performance, Robustness, Distributability, Maintainability.  

Explanation:

See attachment for the Model object classes which may be utilized in the system implementation to represent a mailbox and an email message.

Advantages:

Large-scale reuse Software architecture is vital because it affects the performance, robustness, distributability, and maintainability of a system.

Individual components implement the functional system requirements, but the dominant influence on the non-functional system characteristics is that the system's architecture.

Three advantages of System architecture:

• Stakeholder communication: The architecture may be a high-level presentation of the system which will be used as attention for discussion by a variety of various stakeholders.

• System analysis: making the system architecture explicit at an early stage within the system development requires some analysis.

• Large-scale reuse:

An architectural model may be a compact, manageable description of how a system is organized and the way the components interoperate.

The system architecture is usually an equivalent for systems with similar requirements then can support large-scale software reuse..

7 0
3 years ago
A presenter selects multimedia materials primarily based on their ability to
Kisachek [45]
A presenter selects multimedia materials primarily based on their ability to emphasize a point.
7 0
3 years ago
Read 2 more answers
What does the CMYK tab let you do
Paha777 [63]

<span>CMYK means cyan, magenta, yellow, and key (black). They are the four color model used in color printing or printing color images. It lets you subtract the colors on the image. CMYK partially or fully masks colors on a lighter view. </span>

3 0
3 years ago
Read 2 more answers
In cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multiply the number of shares
irakobra [83]

Answer:

Answer is attached. If you have any further questions, feel free to ask. I also completed the total investment value.

Download xlsx
6 0
3 years ago
Select the correct answer.
Phoenix [80]
Data availability is the one related to the server being down.
4 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • 4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
    6·1 answer
  • Which of the following is the most effective password?
    15·2 answers
  • Write a program that reads a stream of integers from the console and stores them in an array. The array is then analyzed to comp
    10·1 answer
  • If x=3.123, then int(x) will give ?
    5·1 answer
  • A brown outline around a frame is an indication of which tool?​
    13·1 answer
  • What is the protocol for getting to the Web?
    9·2 answers
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!