1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
2 years ago
10

PLEASE HELP How have phones made us spoiled? How have phones made us unhappy?

Computers and Technology
1 answer:
Ket [755]2 years ago
3 0
Phones have made us spoiled because we have everything at our fingertips. we get what we want when we see something online and we want to get it all we do is ask and most of us receive. phone have made us unhappy mentally and physically because we see how other people have it like richer for instance and we want that and we get sad about weird things because of what we see like other peoples body’s how skinny someone is and how fat someone is it makes us sad because we just want to be like them.
You might be interested in
The rubric given to them by their teacher requires that
Arte-miy333 [17]

Answer:1:navigate to the paragraph command group

2:Click the line and paragraph spacing option

3:Click the space required

Explanation:

3 0
3 years ago
What is the largest safety threat to the ISS?<br> Will give brainlest :)
bulgar [2K]

Answer:

The largest safety threat to the ISS are the micrometeorite and orbital debris (MMOD) fires, impacts and toxic spills. These pose the biggest threat to the ISS astronauts.

Explanation:

The debris is as a result of collisions. An observation revealed that once a certain mass is passed, collisions give rise to more debris.

Another report revealed that the station has about 55% chance of being hit by tiny space rocks over a 10-year period. They can protected by installing new impact-protecting panels to the exterior of the station.

ISS means International Satellite Station.

4 0
3 years ago
What is the treaty of paris
vova2212 [387]

The Treaty of Paris, signed in Paris by representatives of King George III of Great Britain and representatives of the United States of America on September 3, 1783, ended the American Revolutionary War. Hope this helps :)

5 0
3 years ago
Read 2 more answers
Refer to the exhibit. Switch SW2 was tested in a lab environment and later inserted into the production network. Before the trun
svet-max [94.6K]

Answer:

Switch SW2 seems to have a greater VTP revision number that creates the VLAN data to be deleted in the VTP domain.

Explanation:

Switch SW2 became examined and eventually placed into another production network. Prior to connecting the trunk connection among both SW1 and SW2, the service provider admin enacted the exhibit vtp status instruction as shown in the monitor. Both clients missed access to the network shortly when the switches got linked.

So, the possible reason for the issue is to Switch SW2 tends to have a larger VTP modification percentage allowing that VLAN data to be removed from the VTP domain.

8 0
3 years ago
Write a c++ program called checkmonth​
marin [14]

Explanation:

C++ Program to display month name according to the month number using Switch Statement

that's why called checkmonth

/* C Program to display month name according to the month number using Switch Statement */ #include<stdio.h> int main() { int n; printf("Month No : "); scanf("%d",&n); switch(n) { case 1: printf("January"); break; case 2: printf("February"); break; case 3: printf("March"); break; case 4: printf("April"); break; case 5: printf("May"); break; case 6: printf("June"); break; case 7: printf("July"); break; case 8: printf("August"); break; case 9: printf("September"); break; case 10: printf("October"); break; case 11: printf("November"); break; case 12: printf("December"); break; default: printf("Invalid Month number\nPlease try again ....\n"); break; } return 0; }

3 0
3 years ago
Other questions:
  • Which of the following are peripheral devices?
    7·2 answers
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • If a database was being used to track sales, a customer who buys a lot of items would be a good example of how two tables could
    14·1 answer
  • If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
    15·1 answer
  • 1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a s
    11·1 answer
  • BIm computer class I need answers please
    5·2 answers
  • Explain the computer according to size​
    10·1 answer
  • 20 POINTS!!!!!!!!!! will give brainliest
    8·1 answer
  • RAM IS often referred
    9·1 answer
  • Why does my laptop keep disconnecting from the wifi.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!