Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.
_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention
Answer:
stalking ?
Explanation:
Answer:
stalking
Explanation:
Which platforms are used for mobile apps? Select 4 options.
BlackBerry
Bluetooth
iOS
Android
Windows
Answer:
- Blackberry
- iOS
- Android
- Windows
Explanation:
On Edge, it states, "There are two main operating systems used on mobile phones, Android and iOS (the Apple platform). There are also apps for Windows and BlackBerry." (correct on Edge)
I hope this helped!
Good luck <3
Platforms used for mobile apps are
BlackBerryiOSAndroidWindowsWhat are Mobile Apps?On the mobile app, there are two main platforms namely iOS and Android.An application platform is defined as a framework of services that application programs on for standard operations. An application platform operates in five principal areas and they are development tools, execution services, data services, operating systems (OSes), and cloud services.Three mobile apps are Native Mobile AppsHybrid Mobile AppsWeb AppsReact Native is the most used cross-platform mobile app development framework.To learn more about Mobile apps refer to:
https://brainly.com/question/20366434
#SPJ
Project light with a system of lenses used for projecting slides or film into a screen.
Answer:
Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.
Explanation:
What is one still image in a film or video called?
unit
frame
stand
selection
Answer:
frame
Explanation:
the answer is frame ;)
Answer:
Frame
A still frame is a single static image taken from a film or video, which are kinetic (moving) images. Still frames are also called freeze frame, video prompt, preview or misleadingly thumbnail, keyframe, poster frame, or screen shot/grab/capture/dump
Explanation:
Pls mark as brainliest
Ctrl+Home moves the cell pointer to the cell__________MSExcel.
Answer:
key stroke
Explanation:
Ctrl+Home moves the cell pointer to the cell___key stroke_______MSExcel.
The answer will be
[tex]key \: \: \: \: stroke[/tex]
Hope it helps.
ray4918 here to help
What important role is being described?
Completes the Action Item form.
Answer:
A sponsor is a member of congress who is willing to introduce and back the legislation. Explanation:
These operating systems were referred to as command-based.
Android and MS-DOS
iOS and Windows
LINUX and UNIX
MS-DOS and UNIX
[tex]{\underline{\boxed{\bf{MS - DOS \: and \: UNIX}}}}[/tex]
What are other ways you could use the shake or compass code blocks in physical computing projects?
Answer:
There are different ways of quick navigation between files and functions. ... You should use the menu 'Remove file from project' instead of deleting files. ... A Makefile generation tool for Code::Blocks IDE
What type of computer is IBM 1401 ?
Answer:
The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.
What actions does Kareem need to take to change the timing of an animation in one
of his presentation slides?
a) Change the order of the animation for the slide.
b) Change the type of animation for the slide.
c) Change the delay and duration for the slide.
d) Change the trigger for the slide.
What Kareem needs to do to change the timing of animation is change the delay and duration for the slide.
A typical Presentation slide helps to keep an audience's attention during a presentation and as well provide additional supporting information.
A presentation slides entails the use of text, images, artworks, aesigns, animation to facilitate a smart slide for proper presentation.
Animation basically move on the slides and are timed/programmed to move in a specific time or direction.
Therefore, in conclusion, Option C is correct. All Kareem have to do to change the timing of an animation in the slide is changing the delay and duration for the animation.
Read more on this here
brainly.com/question/11389651
Which of the following is an example of an output device on a smartphone?
the speaker
the microphone
the battery
the memory card
Answer:
The speaker
Explanation:
Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.
highlight and detail two ways that you can use excel to make you more efficient as a college student
MS excel is a office program and is quite commonly used in day to day business. The application is easy to use and have various advantages, as it can be used for statistical and scientific purposes.
The application can be made easy and presented in numerous ways. In order to highlight the importance of this software as a college student one can show the methods to interpret the data. Making worksheets and visualizing large amounts of data. Use of shortcuts for formula and use graphics to enhance presentations.Learn more about the detail two ways that you can use excel to make you.
brainly.com/question/24325415.
PYTHON: Define a function calc_pyramid_volume() with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. calc_pyramid_volume() calls the given calc_base_area() function in the calculation.
Relevant geometry equations:
Volume = base area x height x 1/3
(Watch out for integer division).
Sample output with inputs: 4.5 2.1 3.0
Volume for 4.5, 2.1, 3.0 is: 9.45
def calc_base_area(base_length, base_width):
return base_length * base_width
''' Your solution goes here '''
length = float(input())
width = float(input())
height = float(input())
print('Volume for', length, width, height, "is:", calc_pyramid_volume(length, width, height))
I've been trying all morning but I can't seem to figure this one out. I might be overthinking it, but I haven't been able to get it to work.
Answer:
def calc_pyramid_volume(base_length,base_width,pyramid_height):
base_area=base_length*base_width
volume=base_area*pyramid_height*(1/3)
return volume
Explanation:
Here you go, fellow cs 105 student. Copy and paste it all into the box.
________(fill in the blank)in online education is intrinsically related to equity.
Accessibility
Communication
Professionalism
Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!
Answer:
5=5
Explanation:
2+2 is 4
Below is the required Python code for the program.
PythonProgram code:
# Starting the code
# Defining a function
def same_ends(lst, n):
# Starting a loop
if lst[:n] == lst[-n:]:
return True
else:
return False
# Testing the function
lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]
# Printing the values
print(same_ends(lst,4))
print(same_ends(lst,3))
Explanation:
Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.Output:
Find below the attachment of the code output.
Find out more information about python here:
https://brainly.com/question/26497128
a paragraph about the different types of college degrees
Answer:
There are four major categories of degrees available for postsecondary students. These college degrees in order of complexity are associate, bachelor's, master's, and doctoral degrees. Earning one of these degrees can take 2-8 years, depending on the level of the degree and field of study. Graduate-level university degrees may require students to complete one or more undergraduate programs prior to enrollment. When comparing different degrees, students can consider which program best fits their career goals and academic interests. Keep in mind that all college degrees require completion of a high school diploma first.
Explanation:
Describe how reflection can be used to achieve team improvement.
Answer:
Explanation:
Research also proves that encouraging your team to adopt a reflective process is likely to improve job performance, especially when reflection is coupled with an examination of the strategies .
identifica clases de técnicas que se emplean para el desarrollo y emplean empleo de las cosas que nos rodean hechos para satisfacer la necesidad del ser humano.
AYUDA ES PARA HOYY
Y PORFAVOR EXPLÍQUENME EN ESPAÑOL
Answer:
HEY I SAID PHYSICS NOT COMPUTER STUFF
Explanation:
I CAN'T EVEN READ IT
You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.
How should you implement this without storing the customers' credentials on the BuyMe server?
a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML
Answer:
Use TACACS+. IT IS THE BEST
Explanation:
IT IS THE BEST
Answer: Use SAML
Explanation:
LANGUAGE IS PYTHON PLEASE HELP.
Write a while loop that repeats while user_num ≥ 1. In each loop iteration, divide user_num by 2, then print user_num.
Sample output with input: 20
10.0
5.0
2.5
1.25
0.625
Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B
Answer:
technician A if you use the net it still saves the hair than letting it long and exposed
Electronic payment system is a——–.
a. An informal report.
b. Not having legal sanction.
c. Always a statistical report.
d. Formal report.
[tex]\huge \mathcal \fcolorbox{cyan}{black}{ \blue{AnSweR}}[/tex]
Electronic payment system is a Formal report.someone pls help me!!!
Answer:
I think it’s really cool. You don’t have to find someone’s Gm ail and then write a subject and whatever else. You can just send it like a message. I love how it has the call option because it means that you don’t have to have a number to call your friends or family. And you can do business em ail while messaging whoever you need to instead of going back and forth.
You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have emails and it’s fairly simple to just add your friend and text them.
It might be hard to figure out at first. But when you get used to it it’s fairly simple. It can also shut down due to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your Gm ail and read all of your information.
Explanation: heres a better one with no typos
8. This machine is used for high speed, high volume printing l. Can print about 1000 papers at one point in time.
A) Scanner
B) Printer
C) Risograph
D) Photocopier
Answer:
Risographs can produce up to typically 150 pages per minute. So I'm guessing its c.
Explanation:
Give one of user responsibility of the internet you should follow in cyberethics.
**Answer and I will give you brainiliest**
Answer:
One of the user responsibility is to use appropriate language when talking to others, mind you behavior and make sure to stay out of trouble, like hacking someone computer without permission and never send any malware to anyone without consent of the user.
When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the above sentence in your opinion.
**Answer and I will give you brainiliest**
Answer:
yest that's correct.
Explanation:
for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.
some people will become lazy and don't use their brain for anything
Compare Ethernet frames to other frames.
•Most frames use CRC, but Ethernet does not. •Most frames use a protocol called CSMA/CD.
•Ethernet frames generally do not have stop frames.
•Ethernet frames have more parts in their frame footers.
List 2 negative impacts of cybersecurity.
Answer and I will give you brainiliest
Answer:
Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.
3. Find the best.
Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.
Do this with beginner c programming.
Example output:
Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1
Average Score = 5.3333, best = 10
Answer:
1. is the answer
Explanation:
mark me as brainlestProject: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.
Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.
What are the research paper's impacts on cyberbullying?The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.
Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.
To know more about the Cyber Bullying visit;
https://brainly.com/question/1460915
#SPJ1