1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
15

Why would over-50 executives have a harder time buying into the idea of social media?​

Computers and Technology
1 answer:
notsponge [240]3 years ago
6 0

Answer:

Most likely that social media has a large number of user base already and also a large number of social media platforms are already there so it is hard to compete will those big competitors like Discord.

please give brainliest

You might be interested in
What is the biggest disadvantage of copying a worksheet into another workbook?
san4es73 [151]
The answer is B)The worksheets may not work in the new workbook.
7 0
3 years ago
What are the uses of a modem
Vlada [557]

Modem provides internet, WiFi, we can connect multiple devices to internet through modem.

Modem provides radiation of short wavelength and the transmitter in your mobile phones and computers convert those radiations into digital signals and vice-versa.

5 0
3 years ago
How were the pages made to create the Book of Kells? a. Scribes prepared the papers using a printing press. b. 185 calves were s
NeX [460]

Answer:

The answer is "Option b".

Explanation:

This is the book of the liturgical manuscript for the catholic churches, which is the four Scriptural texts now in Cambridge, Dublin, and Ireland. It is the job, which is known for the sophistication, accuracy, and elegance of that same paintings in the Classically illustrated scripts. It was been built between 800 AD by Celtic monks to build vellum 185 calves had been killed, and the incorrect option can be defined as follows:

  • In option a, This book is not used in the printing press.
  • In option c, This book is used in the liturgical manuscript.
7 0
3 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
4 years ago
The general syntax for the function prototype to overload the assignment operator = for a class is ____.a. friend className&
dsp73

Answer:

Option (B) is the correct answer to the following question.

Explanation:

Here, in the code "const" is the constant keyword which is used when we need that the value stored in that variable will never change.

The following option is correct because the assignment operator are those operator which initialize the value in the variable and overloading of the assignment operator would be as we use the other operators and also we could use them by creating the objects as we use in the copy constructor.

So, that's why the following option is correct.

4 0
3 years ago
Other questions:
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • A technician has just installed a video card in a PC. The video card is not working, althoughit was working fine on the test ben
    6·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • Which of the following is an example of phishing attack? csp
    8·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Write an alogrithm to display the first ten even numbers​
    6·1 answer
  • Type the correct answer in the box
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!