1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
10

Online interaction with social media platforms:__________.

Computers and Technology
1 answer:
Verdich [7]3 years ago
4 0

Answer:

social media precense is your answer

You might be interested in
Which of these is NOT a reason why you would print handouts of your presentation?
Maslowich
B. It's obvious enough right ?
6 0
4 years ago
For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
belka [17]

Answer:

Set of Functions

Explanation:

Function is a type of procedure or routine used to perform a specific task in computer programming.

With center (x,y) and radius r of any size of cycle, function h contain the cycle. What one need to do is to input the value of x and y and the radius. This is used in C graphics.

8 0
3 years ago
What is the name of the formal procedure scientists use to study the world around them?
bearhunter [10]
The correct answer to your question is the scientific method hope this helps !
4 0
4 years ago
Read 2 more answers
Use the Windows ________ to check on a nonresponsive program. Select one: A. Backup utility B. Task Manager C. System Restore D.
Nitella [24]
The answer is task manager. You can access it by pressing the Windows key and searching "task manager". You can also press ctrl+alt+delete or ctrl+shift+esc to access it.

Taskanager will show you all the applications currently running and how many resources they are using. If a task is unresponsive, it can be force closed from task manager.
4 0
3 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
Other questions:
  • The Maui coffee shop sells coffee at $10.50 a pound plus the cost of shipping. Each order ships for $0.86 per pound + $1.50 fixe
    14·1 answer
  • The best way to insert an existing Excel chart into a document is to
    8·1 answer
  • In ____________, a large address block could be divided into several contiguous groups and each group be assigned to smaller net
    7·1 answer
  • 4. Explain the term prejudice. What is an example of prejudice as it relates to parenting?
    11·1 answer
  • A(n) ________________ must be completed immediately following an incident as it is an essential document that details an inciden
    14·1 answer
  • What is LINUX?
    6·2 answers
  • 3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical
    12·1 answer
  • What will happen if you reverse the connection of IDE?<br>​
    9·1 answer
  • The process of recording and reporting the financial data for a business is known as:
    6·2 answers
  • What are web site and web page?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!