How is advertising using social media different from using traditional advertising?

Answers

Answer 1

Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.


Related Questions

_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention

Answers

Answer:

stalking ?

Explanation:

Answer:

stalking

Explanation:

Which platforms are used for mobile apps? Select 4 options.
BlackBerry
Bluetooth
iOS
Android
Windows

Answers

Answer:

- Blackberry

- iOS

- Android

- Windows

Explanation:

On Edge, it states, "There are two main operating systems used on mobile phones, Android and iOS (the Apple platform). There are also apps for Windows and BlackBerry."  (correct on Edge)

I hope this helped!

Good luck <3

Platforms used for mobile apps are

BlackBerryiOSAndroidWindowsWhat are Mobile Apps?On the mobile app, there are two main platforms namely iOS and Android.An application platform is defined as a framework of services that application programs on for standard operations. An application platform operates in five principal areas and they are development tools, execution services, data services, operating systems (OSes), and cloud services.Three mobile apps are Native Mobile AppsHybrid Mobile AppsWeb AppsReact Native is the most used cross-platform mobile app development framework.

To learn more about Mobile apps refer to:

https://brainly.com/question/20366434

#SPJ

Project light with a system of lenses used for projecting slides or film into a screen.

Answers

Answer:

Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.

Explanation:

What is one still image in a film or video called?
unit
frame
stand
selection

Answers

Answer:

frame

Explanation:

the answer is frame ;)

Answer:

Frame

A still frame is a single static image taken from a film or video, which are kinetic (moving) images. Still frames are also called freeze frame, video prompt, preview or misleadingly thumbnail, keyframe, poster frame, or screen shot/grab/capture/dump

Explanation:

Pls mark as brainliest

Ctrl+Home moves the cell pointer to the cell__________MSExcel.​

Answers

Answer:

key stroke

Explanation:

Ctrl+Home moves the cell pointer to the cell___key stroke_______MSExcel.

The answer will be

[tex]key \: \: \: \: stroke[/tex]

Hope it helps.

ray4918 here to help


What important role is being described?
Completes the Action Item form.

Answers

Answer:

A sponsor is a member of congress who is willing to introduce and back the legislation. Explanation:

These operating systems were referred to as command-based.

Android and MS-DOS
iOS and Windows
LINUX and UNIX
MS-DOS and UNIX

Answers

[tex]{\underline{\boxed{\bf{MS - DOS \: and \: UNIX}}}}[/tex]

It is Linux and Unix!

What are other ways you could use the shake or compass code blocks in physical computing projects?​

Answers

Answer:

There are different ways of quick navigation between files and functions. ... You should use the menu 'Remove file from project' instead of deleting files. ... A Makefile generation tool for Code::Blocks IDE

What type of computer is IBM 1401 ?

Answers

Answer:

The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.

What actions does Kareem need to take to change the timing of an animation in one
of his presentation slides?
a) Change the order of the animation for the slide.
b) Change the type of animation for the slide.
c) Change the delay and duration for the slide.
d) Change the trigger for the slide.

Answers

What Kareem needs to do to change the timing of animation is change the delay and duration for the slide.

A typical Presentation slide helps to keep an audience's attention during a presentation and as well provide additional supporting information.

A presentation slides entails the use of text, images, artworks, aesigns, animation to facilitate a smart slide for proper presentation.

Animation basically move on the slides and are timed/programmed to move in a specific time or direction.

Therefore, in conclusion, Option C is correct. All Kareem have to do to change the timing of an animation in the slide is changing the delay and duration for the animation.

Read more on this here

brainly.com/question/11389651

Which of the following is an example of an output device on a smartphone?
the speaker
the microphone
the battery
the memory card

Answers

Answer:

The speaker

Explanation:

Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.

highlight and detail two ways that you can use excel to make you more efficient as a college student

Answers

You can use excel to help you become more successful because you can use it to write all your grades for each class and see what you need to improve on. You can also keep track of everything on a spreadsheet. Another way excel helps you and is beneficial in college is you can use it to put the information of all the classes you have taken to see if you have enough credits or what credits you will need to pass. Excel is very beneficial in many ways.

MS excel is a office program and is quite commonly used in day to day business. The application is easy to use and have various advantages, as it can be used for statistical and scientific purposes.

The application can be made easy and presented in numerous ways. In order to highlight the importance of this software as a college student one can show the methods to interpret the data.  Making worksheets and visualizing large amounts of data. Use of shortcuts for formula and use graphics to enhance presentations.

Learn more about the detail two ways that you can use excel to make you.

brainly.com/question/24325415.

PYTHON: Define a function calc_pyramid_volume() with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. calc_pyramid_volume() calls the given calc_base_area() function in the calculation.

Relevant geometry equations:
Volume = base area x height x 1/3
(Watch out for integer division).

Sample output with inputs: 4.5 2.1 3.0
Volume for 4.5, 2.1, 3.0 is: 9.45

def calc_base_area(base_length, base_width):
return base_length * base_width

''' Your solution goes here '''

length = float(input())
width = float(input())
height = float(input())
print('Volume for', length, width, height, "is:", calc_pyramid_volume(length, width, height))

I've been trying all morning but I can't seem to figure this one out. I might be overthinking it, but I haven't been able to get it to work.

Answers

Answer:

def calc_pyramid_volume(base_length,base_width,pyramid_height):

   base_area=base_length*base_width

   volume=base_area*pyramid_height*(1/3)

   return volume

Explanation:

Here you go, fellow cs 105 student. Copy and paste it all into the box.

________(fill in the blank)in online education is intrinsically related to equity.
Accessibility
Communication
Professionalism

Answers

Accessibility is the answer

Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!

Answers

Answer:

5=5

Explanation:

2+2 is 4

Below is the required Python code for the program.

Python

Program code:

# Starting the code

# Defining a function

def same_ends(lst, n):

   # Starting a loop

   if lst[:n] == lst[-n:]:

       return True

   else:

       return False

# Testing the function

lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]

# Printing the values

print(same_ends(lst,4))

print(same_ends(lst,3))

Explanation:

Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.

Output:

Find below the attachment of the code output.

Find out more information about python here:

https://brainly.com/question/26497128

a paragraph about the different types of college degrees

Answers

Answer:

There are four major categories of degrees available for postsecondary students. These college degrees in order of complexity are associate, bachelor's, master's, and doctoral degrees. Earning one of these degrees can take 2-8 years, depending on the level of the degree and field of study. Graduate-level university degrees may require students to complete one or more undergraduate programs prior to enrollment. When comparing different degrees, students can consider which program best fits their career goals and academic interests. Keep in mind that all college degrees require completion of a high school diploma first.

Explanation:

Describe how reflection can be used to achieve team improvement.

Answers

Answer:

Explanation:

Research also proves that encouraging your team to adopt a reflective process is likely to improve job performance, especially when reflection is coupled with an examination of the strategies .

identifica clases de técnicas que se emplean para el desarrollo y emplean empleo de las cosas que nos rodean hechos para satisfacer la necesidad del ser humano.


AYUDA ES PARA HOYY

Y PORFAVOR EXPLÍQUENME EN ESPAÑOL

Answers

Answer:

HEY I SAID PHYSICS NOT COMPUTER STUFF

Explanation:

I CAN'T EVEN READ IT

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.

How should you implement this without storing the customers' credentials on the BuyMe server?

a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML

Answers

Answer:

Use TACACS+. IT IS THE BEST

Explanation:

IT IS THE BEST

Answer: Use SAML

Explanation:

LANGUAGE IS PYTHON PLEASE HELP.

Write a while loop that repeats while user_num ≥ 1. In each loop iteration, divide user_num by 2, then print user_num.

Sample output with input: 20
10.0
5.0
2.5
1.25
0.625

Answers

10.0 + 5.0 + 2.5 = 17

Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B​

Answers

Answer:

technician A if you use the net it still saves the hair than letting it long and exposed

Electronic payment system is a——–.
a. An informal report.
b. Not having legal sanction.
c. Always a statistical report.
d. Formal report.

Answers

[tex]\huge \mathcal \fcolorbox{cyan}{black}{ \blue{AnSweR}}[/tex]

Electronic payment system is a Formal report.
The answer is a. An informal report.

someone pls help me!!!

Answers

Answer:

I think it’s really cool. You don’t have to find someone’s Gm ail and then write a subject and whatever else. You can just send it like a message. I love how it has the call option because it means that you don’t have to have a number to call your friends or family. And you can do business em ail while messaging whoever you need to instead of going back and forth.  

You can promote your business. You can also promote your video and share your screen. It is also a good way to talk to customers to discuss what you need to. A bunch of people have emails and it’s fairly simple to just add your friend and text them.  

It might be hard to figure out at first. But when you get used to it it’s fairly simple. It can also shut down due to a bug and stop working, which makes it even more complicated. You can also get creeps that can hack into your Gm ail and read all of your information.

Explanation: heres a better one with no typos

8. This machine is used for high speed, high volume printing l. Can print about 1000 papers at one point in time.

A) Scanner
B) Printer
C) Risograph
D) Photocopier

Answers

Answer:

Risographs can produce up to typically 150 pages per minute. So I'm guessing its c.

Explanation:

Give one of user responsibility of the internet you should follow in cyberethics.






**Answer and I will give you brainiliest**​

Answers

Answer:

One of the user responsibility is to use appropriate language when talking to others, mind you behavior and make sure to stay out of trouble, like hacking someone computer without permission and never send any malware to anyone without consent of the user.

When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the above sentence in your opinion.




**Answer and I will give you brainiliest**​

Answers

Answer:

yest that's correct.

Explanation:

for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.

some people will become lazy and don't use their brain for anything

Compare Ethernet frames to other frames.


•Most frames use CRC, but Ethernet does not. •Most frames use a protocol called CSMA/CD.

•Ethernet frames generally do not have stop frames.

•Ethernet frames have more parts in their frame footers.

Answers

Most frames use crux and I can only do a couple

List 2 negative impacts of cybersecurity.



Answer and I will give you brainiliest ​

Answers

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

3. Find the best.

Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.

Do this with beginner c programming.

Example output:

Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1

Average Score = 5.3333, best = 10

Answers

Answer:

1. is the answer

Explanation:

mark me as brainlest

Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.

Answers

Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.

What are the research paper's impacts on cyberbullying?

The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.

Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.

To know more about the Cyber Bullying visit;

https://brainly.com/question/1460915

#SPJ1

Other Questions
I JUST NEED TO KNOW THE EXPRESSION I WILL GIVE BRAINLIESTJackson purchased a pack of game cards that was on sale for 22% off. The sales tax in his county is 6%. Let y represent the original price of the cards. Write an expression that can be used to determine the final cost of the cards. How successful were the British in expanding their control over Indianterritories between 1750 and 1850? Explain your answer. /14 Describe why churches were important in African American communities duringReconstruction What does Draw your own interpretation using available resources means? (No useless answers) This satirical lithograph, published by Currier and Ives in New York in 1869, comments on the feminist movement. A satirical lithograph titled "The Age of Brass." It shows woman standing in line to vote for another woman. A sign next to the female candidate reads, "Vote for the celebrated man tamer." A woman is scolding her husband, who is holding a baby. Which statement most likely represents the point of view of Currier and Ives? Women should be allowed to vote because they dress better than men. Women should not be allowed to vote because gender roles will be reversed. Women should not be allowed to vote because more women will go to the polls than men. Women should be allowed to vote because it will force men to act more responsibly. Select the equation which represents solving for the variable y.3x+3y=21y=x7y=x+7y=3x21y=3x+21 As part of Europe's feudal system, some people were tied to the land they worked and were unable to leave without permission. Whowere they? Which of these macromolecules are made of fatty acid molecules?O proteinsO lipidsO carbohydratesnucleic acidsQuestion 16 COMO CREES QUE SE PODRIA SOLUCIONAR LA POBREZA ?? POR FAVOR DOY CORONA , Y CORAZON ( E QUE NO SEPA NO ESCRIBA ) :( Whats the domain and range ? A square playground has an area of 200 m2. Estimate the length of one side. A: 14m B: 100m C: 20 mPick one! Plzzz help me I will give Brainliest I need Math HW done asap! Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.Online Content: Site 1How does Frida Kahlo's work reflect her identity? What are some other themes present in her work? (site 1) For brainily please help jack divided 1,826 by to get a quotient of 18.265 How do citizens experience economic freedom?a.Petitioning the governmentb.Electing representativesc.Exercising religiond.Owning property If you have 4 pieces of candy split evenly into 2 bags, how many pieces of candy are in each bag? i need help can some one help The Continental CongressDelegates from every colony except (1)____________attended the Continental Congress in September 1774. At the gathering, Patrick Henry stated, Iam not a Virginian, but an (2)______________. The most important decisiondelegates made concerned armed opposition to Great Britain. Aresolution was passed to form a (3)______________.The First BattleWell-prepared militia companies in Massachusetts were known as(4)_____________. General Thomas Gage ordered(5)______________ and his troops to go to(6)_____________ and destroy all the artillery and ammunition.When Dr. Joseph Warren saw the British troops march out of Boston on the night of(7)_____________, he rushed to alert(8)______________ and William Dawes. Revere and Dawes thenrode to Lexington to warn Samuel Adams and(9)____________. In Lexington, the redcoats came across a group of about(10)_____________, and the fight for independence began.Along the road from Concord to (11)_______________, colonists fired atthe British, wounding 200 and killing 73.More Military ActionOn May 10, 1775, a small group of New Englanders, known as the(12)____________, led by (13)____________captured the British Fort Ticonderoga at Lake Champlain. Committees of(14)____________ sent out calls for volunteers to join the militias. In June,1775, redcoats charged militia members on (15)____________.The colonists ran out of (16)_____________ and withdrew, but the Britishsuffered heavy losses. The (17)________ did not consider unfair taxesand regulations sufficient cause for rebellion. The (18)______,however, were determined to fight for independence.fill in the blanks with theseGreen Mountain BoyscorrespondenceMaj. John PitcairnLt. Col. Francis SmithBreeds HillEthan AllenAmericanWord BankApril 18, 1775BostonConcordGeorgiaJohn Hancockminutemen70 minutemengunpowdermilitiasLoyalistsPatriotsPaul Revere which takes more energy, going from 0 to 30, or from 30 to 60? How tall is House B?