Pls due soon



Directions: Answer these questions as you navigate through the modules of the Computer Basics Tutorial.



Define computer:

What are the functions of a computer?

Name three ways in which you can use a computer?

Define hardware:

Define software:

Name at least four different types of computers.

What are the two main styles that personal computers come in?

What is the purpose of the operating system?

Name the three most common operating systems for PCs.

What does GUI stand for and what is its purpose?

In what year did Microsoft create Windows?

What is MAC OS?

What is Linux?

Name three operating systems designed specifically for mobile devices?

What is an App?

What are apps for mobile devices called?

Name six types of desktop applications?

Name three examples of mobile apps (does not have to come from the tutorial)?

What is the Cloud?

Name three services that use the Cloud?

Give at least one reason why someone would want to use the Cloud.

Give three examples of web apps?

What are the basic parts of a desktop computer and what purpose does each one serve?

Name two common mouse alternatives?

Name at least five peripherals?

What is the CPU/Processor of a computer?

How is the processor’s speed measured?

What is the motherboard and what purpose does it serve?

What does the power supply unit do?

What is RAM and what is it measured in?

What is a hard drive and what purpose does it serve?

What is the purpose of each of the following:

expansion card

video card

sound card

network card

Bluetooth card

What is a laptop computer and how is it different from a desktop computer?

What is a mobile device? Give three examples.

What is a smartphone?

What are 3G, 4G, and LTEs?

How is a tablet computer different from a laptop? What are some advantages and disadvantages of using a tablet?

What is the desktop and what features does it usually contain?

What is the purpose of using folders on the computer?

What is the purpose of the Recycle Bin?

Name three things you need to access the Internet?

Describe each of the following common types of Inter services:

Dial-up

DSL

Cable

Satellite

3G and 4G

What are some things you should consider when you are choosing and Internet Service Provider?

What is a modem?

What is a router?

What is a network card?

What does Wi-Fi stand for?

What is a web browser and what is its main job?

What is the World Wide Web?

Name three different types of web browsers?

Explain the following security terms:

SSID:

Encryption password

Encryption

Passphrase

What steps do you need to take to keep your computer healthy?

How do you deal with spilled liquid on your keyboard?

How do you clean the mouse and the monitor?

What is malware and what does it include? What is the best way to guard against malware?

In what ways can you back up your computer?

Name several techniques to maintain your computer?

Define computer ergonomics.

What are four general tips to keep in mind when troubleshooting your computer?

What is a flash drive?

What is Cloud storage?

What is the proper way to safely remove a flash drive from the computer?

Name three free popular services that allow you to save data to the Cloud?

What are accessibility features? Name three?

Name three assistive technology devices and what they are used for?

Answers

Answer 1

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:


Related Questions

Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size. Suppose a list stores the values [1, 3, 2, 7]. After calling list.doubleUp(), the list should store the values [1, 1, 3, 3, 2, 2, 7, 7].

Answers

Answer:

def double_up(self, mylist):

   doubled = list()

   for item in mylist:

       for i in range(2):

           doubled.append(item)

   return doubled

Explanation:

The program method double_up gets the list argument, iterates over the list and double of each item is appended to a new list called doubled.

Methods are functions defined in classes. A class is a blueprint of a data structure. Each instance of the same class holds the same attributes and features.

Can you withdraw from courses in top hat?

Answers

Answer:

Yes, but this must be done before the withdraw deadline

Explanation:

TopHat is an online learning platform. Students register for courses and if they decide not to continue with a course for reasons best known to them, they are allowed a time period usually one to two weeks to drop the courses. They are then reimbursed the fee for that particular course.

But if that time period elapses and they drop the course, that is considered a withdrawal that is not accepted and which no provisions for reimbursements are made.

Which of these type parameters is used for a generic class to returnrand accept any type of object?
Select one:
a. T
b. N
C.V
d. E
e. K​

Answers

Answer:

To accept and return any type of object T

hich of these statements is a value statement?
a.
Tacos are delicious.
b.
Lying is wrong.
c.
Cooking is hard.
d.
Puppies are funny.

Answers

The answer to your question is b
the answer would be B, lying would be the “value” part of the statement

Select the correct answer.
Which task occurs during the development phase of the SDLC?
A.
requirements gathering
OB.
coding
O C.
maintenance
OD. budgeting

Answers

Answer:

The correct answer is: Option OB. Coding

Explanation:

Software Development Life Cycle is used to develop software. It is a general collection of steps that have to be followed in development of software.

The development phase comes after the system design phase of SDLC. The coding and programming for software is done in the development stage.

Hence,

The correct answer is: Option OB. Coding

Answer:

coding

Explanation:

A slot machine is a gambling device that the user inserts money into and then pulls a lever (or presses a button). The slot machine then displays a set of random images. If two or more of the images match, the user wins an amount of money that the slot machine dispenses back to the user. Design a program that simulates a slot machine. When the program runs, it should do the following: Ask the user to enter the amount of money he or she wants to insert into the slot machine. Instead of displaying images, the program will randomly select a word from the following list: Cherries, Oranges, Plums, Bells, Melons, Bars The program will select and display a word from this list three times. If none of the randomly selected words match, the program will inform the user that he or she has won $0. If two of the words match, the program will inform the user he or she has won two times the amount entered. If three of the words match, the program will inform the user that he or she has won three times the amount entered. The program will ask whether the user wants to play again. If so, these steps are repeated. If not, the program displays the total amount of money entered into the slot machine and the total amount won.

Answers

Answer:

import random

is_cont = 'y'

amount = float(input("Enter amount: "))

total = 0.0

slot = ['Cherries', 'Oranges', 'Plums', 'Bells', 'Melons', 'Bars']

while is_cont == 'y':

   hold = []

   for i in range(3):

       ent = random.choice(slot)

       print(ent)

       hold.append(ent)

   if hold.count(hold[0]) == 3 or hold.count(hold[1]) == 3 or hold.count(hold[2]) == 3:

       print(f"{3 * amount}")

       total += 3 * amount

   elif hold.count(hold[0]) == 2 or hold.count(hold[1]) == 2 or hold.count(hold[2]) == 2:

       print(f"{2 * amount}")

       total += 2 * amount

   else:

       print("$ 0")

   is_cont = input("Try again? y/ n: ")

Explanation:

The python program is in a constant loop so long as the 'is_cont' variable has a value of 'y'. The program implements a slot machine as it gets an amount of money from the player and randomly selects an item from the slot list variable three times.

If all three selections match, the player gets three times the amount paid and if two items match, then the player gets twice the pay but gets nothing if all three items are different.


b. List any four major drawbacks of the first generation computer​

Answers

Answer:

Terribly low storage space, limited to mathematics/computing, required entire rooms to use, and low information yield for hours of processing.

Explanation:


What is the document that provides basic guidance and regulatory requirements for derivative classification
for DoD personnel?

Answers

Answer: DoDM 5200.01, DoD Information Security Program

Explanation:

The document that provides basic guidance and regulatory requirements for derivative classification

for DoD personnel is referred to as the DoDM 5200.01, DoD Information Security Program.

The purpose of this is to help in the promotion of an effective way that can be used in the classification, protection, and application of applicable instructions.

It should be noted that the  document that provides basic guidance and regulatory requirements for derivative classification for DoD personnel are;

DoDM 5200.01 DoD Information Security Program

According to the question, we are to discuss document that provides basic guidance as well as regulatory requirements for derivative classification.

As a result of this, we can see that the best documents for this is DoDM 5200.01, this is because, provides basic guidance and regulatory requirements as regards a DoD personnel.

Therefore, DoDM 5200.01 serves as document that provides basic guidance and regulatory requirements for derivative classification.

Learn more about DoD Information Security Program at;

https://brainly.com/question/13171394

An employer uses the spreadsheet below to determine the average hourly salary of her four employees. She begins by determining the hourly salary of each person and displaying that in column D. Which formula can she then use to determine the average hourly salary?



=average(D2:D5)

=average(B2:B5)

=average(C2:C5)

=average(B5:D5)

A. =average (D2:D5)

Answers

Answer:

The answer is "=average(D2:D5)"

Explanation:

 In Excel, the AVERAGE function is used to measures the average number, in the arithmetic average.This method is used as the group of numbers, that determines by using the AVERAGE function. This feature is an AVERAGE, which is used to ignores the logical data, empty columns, or text cell. It is up to 255 specific arguments, that could be handled by AVERAGE, including numbers, numerical values, sets, arrays, or constant.

Answer:

A

Explanation:

Popular operating systems include _______. Select all that apply. A. Chrome OS B. Safari C. macOS D. Microsoft Windows

Answers

Answer:

The correct answers are C and D. Popular operating systems include macOS and Microsoft Windows .

Explanation:

An operating system is a program (usually a set of cooperating programs) that is loaded into memory after a computer is started and controls the hardware. It acts as a medium between the hardware and the computer user, with the aim of allowing the user to run programs, being responsible for the start and end of other programs, the control of hardware and the data input. Common operating systems are Microsoft Windows, Apple macOS and Linux.

what are pixels?
A: The colors In an image
B: The overall size of the image
C: The overall file size of the image
D: The smallest unit on the image that can be controlled​

Answers

Answer:

D: The smallest unit on the image that can be controlled

Option D????........

An internet download speed is 4.2 MB/S (constant). How long will it take to download a 30 GB file?

And with 900 KB/S?

Answers

Answer:

(a) [tex]Time= 119.05 \ min[/tex]

(b) [tex]Time= 9.26\ hr[/tex]

Explanation:

Given

[tex]File = 30GB[/tex]

Required

Download time

Solving (a): When Speed =4.2Mb/s

Speed is calculated as:

[tex]Speed = \frac{File\ Size}{Time}[/tex]

Make Time the subject:

[tex]Time= \frac{File\ Size}{Speed }[/tex]

Substitute values for File Size and Speed

[tex]Time= \frac{30Gb}{4.2Mb/s}[/tex]

Convert Gb to Mb

[tex]Time= \frac{30*1000Mb}{4.2Mb/s}[/tex]

[tex]Time= \frac{30000s}{4.2}[/tex]

Convert to minutes

[tex]Time= \frac{30000}{4.2*60}\ min[/tex]

[tex]Time= \frac{30000}{252}\ min[/tex]

[tex]Time= 119.05 \ min[/tex]

When converted, it is approximately 2 hours

Solving (a): When Speed =900Kb/s

[tex]Time= \frac{File\ Size}{Speed }[/tex]

Substitute values for File Size and Speed

[tex]Time= \frac{30Gb}{900Kb/s}[/tex]

Convert Gb to Kb

[tex]Time= \frac{30*1000000Kb}{900Kb/s}[/tex]

[tex]Time= \frac{30*1000000s}{900}[/tex]

[tex]Time= \frac{1000000s}{30}[/tex]

[tex]Time= \frac{100000}{3}s[/tex]

Convert to hours

[tex]Time= \frac{100000}{3*3600}hr[/tex]

[tex]Time= \frac{1000}{3*36}hr[/tex]

[tex]Time= \frac{1000}{108}hr[/tex]

[tex]Time= 9.26\ hr[/tex]

Answer:

(a)

(b)

Explanation:

Given

Required

Download time

Solving (a): When Speed =4.2Mb/s

Speed is calculated as:

Make Time the subject:

Substitute values for File Size and Speed

Convert Gb to Mb

Convert to minutes

When converted, it is approximately 2 hours

Solving (a): When Speed =900Kb/s

Substitute values for File Size and Speed

Convert Gb to Kb

Convert to hours

What's the difference between an IDS and an IPS?

Answers

Answer:

Following are the differences between IDS and IPS

IDS is a monitoring and detection system whereas IPS is a controlling system.IDS does not execute any action on its own whereas IPS accepts or rejects the packets based on the ruleset provided.IDS requires human involvement to review the results whereas IPS updates the database by the new threat faced.

Explanation:

Intrusion Detection System ( IDS )

The system analyzes the network traffic for signals that shows that the attackers use to hack and steal the data is known as Intrusion Detection System ( IDS ). It detects different kinds of behaviors, like security violations and malware.

Intrusion Prevention Systems (IPS)

IPS works like a firewall between the external world and the internal network. IPS actively protects the network from threats based on the security profile provided.

Write a program called FarewellGoodBye that prints the following lyrics. Use static methods to show structure and eliminate redundancy in your solution. Farewell, goodbye, au revoir, good night! It's time, to go, and I'll be out of sight! Farewell, goodbye, au revoir, take care! I'll say, goodbye, that's neither here nor there! Farewell, goodbye, au revoir, see you later! I hope, you think, I'm a lover, not a hater!

Answers

Answer:

Please find the attachment file of the code.

Explanation:

In this code, a static method "lyrics" is declared, that defines three-string variable "a,b, and c ", that holds some values, which is defined in the question and use print method to print other values and prints "a,b, and c" string value inside the main method the static method "lyrics" is called that print the above values.  

A user clicks. such as option buttons and check boxes in a dialog box to provide information

Answers

Answer:

It's an input,

Melissa wrote the following method in Java. It is designed to compute 2^n, but returns an incorrect result. In which line has she made a mistake?
public static int powerTwo(int n)
if (n == 1){
return 1;
} else {
return 2 + powerTwo(n-1);

Answers

Answer:

public static int powerTwo(int n) {

  if (n == 0){

     return 1;

  } else {

     return 2 * powerTwo(n-1);

  }

}

Explanation:

There are actually three mistakes:

2⁰ = 1, so the end criterium of the recursion should be n==0the + should be a *various curly braces missing

(PYTHON) Complete the program to print out nicely formatted football player statistics. Match the following output as closely as possible -- the ordering of players is not important for this example.
2012 quarterback statistics:
Passes completed:
Greg McElroy : 19
Aaron Rodgers : 371
Peyton Manning : 400
Matt Leinart : 16
Passing yards: ...
Touchdowns / Interception ratio:
Greg McElroy : 1.00
Aaron Rodgers : 4.88
Peyton Manning : 3.36
Matt Leinart : 0.00
quarterback_stats = {
'Aaron Rodgers': {'COMP': 371, 'YDS': 4925, 'TD': 39, 'INT': 8},
'Peyton Manning': {'COMP': 400, 'YDS': 4659, 'TD': 37, 'INT': 11},
'Greg McElroy': {'COMP': 19, 'YDS': 214, 'TD': 1, 'INT': 1},
'Matt Leinart': {'COMP': 16, 'YDS': 115, 'TD': 0, 'INT': 1}
}

print('2012 quarterback statistics:')

print(' Passes completed:')
for qb in quarterback_stats:
comp = quarterback_stats[qb]['COMP']
#print(' %?: %?' % (qb, comp)) # Replace conversion specifiers
# Hint: Use the conversion flag '-' to left-justify names

print(' Passing yards:')
for qb in quarterback_stats:
print(' QB: yards')

print(' Touchdown / interception ratio:')
# ...
# Hint: Convert TD/INTs to float before calculating ratio

Answers

Answer:

quarterback_stats = {

'Aaron Rodgers': {'COMP': 371, 'YDS': 4925, 'TD': 39, 'INT': 8},

'Peyton Manning': {'COMP': 400, 'YDS': 4659, 'TD': 37, 'INT': 11},

'Greg McElroy': {'COMP': 19, 'YDS': 214, 'TD': 1, 'INT': 1},

'Matt Leinart': {'COMP': 16, 'YDS': 115, 'TD': 0, 'INT': 1}

}

print("2012 quaterback statistics: ")

print("Passes completed: ")

for qb in quaterback_stats.keys():

   print(f"{quaterback_stats[qb]} : {quaterback_stats[qb]['COMP']}")

print("Passing yards:")

for qb in quaterback_stats.keys():

   print(f"{quaterback_stats[qb]} : {quaterback_stats[qb]['YDS']}")

print("Touchdown / interception ratio")

for qb in quaterback_stats.keys():

   if quaterback_stats[qb]['TD'] > 0 and quaterback_stats[qb]['INT'] > 0:

       print(f"{quaterback_stats[qb]} : {float(quaterback_stats[qb]['TD']) / float(quaterback_stats[qb]['INT])}")

   else:

       print(f"{quaterback_stats[qb]} : {0.0}")

Explanation:

The python program gets data from a dictionary called quaterback_stats which holds the data of football players with their names as the keys and a list of records as the value.

The program prints the individual records from the dictionary using a for loop statement on the list of dictionary keys (using the keys() method).

Did anyone do 5.7.5 Factorial on Code HS??



20 POINTS

Answers

I’m so sorry that you have no more than me and I have to ask you something

The process of changing a variable's data type is called type casting.
True
Or False

Answers

True ! I think totally true (:
This statement would’ve been true

Which Microsoft software program is useful for uploading documents to be accessed remotely?

Answers

Answer:

Microsoft Remote Desktop

Explanation:

The Microsoft software program that is useful for uploading documents to be accessed remotely is: Microsoft OneDrive.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.  Thus, it offer or avail individuals and businesses a fast, effective and efficient way of providing services to their clients over the internet.

Generally, cloud computing comprises three (3) service models and these are;

Platform as a Service (PaaS).Infrastructure as a Service (IaaS).Software as a Service (SaaS).

Microsoft OneDrive can be defined as a software as a service (SaaS) developed by Microsoft Inc. to be used as a cloud (internet-based) storage service and software application synchronization service. It was officially launched on the 7th of August, 2007 by Microsoft.

Basically, Microsoft OneDrive typically offer to its registered customers or end users a free amount of storage space (at least 5 giga-bytes) that can be used to store various type of documents, remotely share digital files, and synchronize multiple files across different mobile and computer-based platforms.

In conclusion, with Microsoft OneDrive you can upload your documents to the cloud and make it available to be accessed remotely by other users.

For more information visit: https://brainly.com/question/7470854

if you were an architect planning on building a large scale Municipal complex what type of engineer would you identify as essential to the Project's success
mechanical engineer
structural engineer
civil engineer
computer engineer​

Answers

Answer: civil engineer

Explanation:

Based on the information given, the type of engineer that would be identified as essential to the success of the project would be the civil engineer.

Civil engineers are the engineers that are in charge of the planning and overseeing building and infrastructure construction. They plan and monitor constructions involving bridges, road, houses, power plants etc.

Answer:

The answer is civil engineer.

Explanation:

Explain why the MS08-067 exploit is bad.

Answers

Answer:

MS08-067 was a security update. It is considered bad.

Explanation:

The MS08-067 was a security bulletin by Microsoft. It was a security update of out-of-band which was released by Microsoft Inc. on October 23rd in the year 2008.

The MS08-067 is considered bad as the vulnerability which stated that the Server service in the Microsoft Windows version of SP4 and XP SP2 and SP3, along with the Server 2003 SP1 and sP2, also Vista Gold as well as SP1, Server. This shows that system is vulnerable to MS08-067 exploit on the Port 445, which makes the TargetVulnerable01 to be a very high-risk system.

1. Trust can be built in a relationship if:
A. There is transparency, both parties feel listened to and understood, communication is
approached with a "win-win" mentality, and all parties assume their due responsibility for
problems and issues
B. There is transparency, and it is established as soon as possible which party is right
C. O All parties feel heard and understood, and the dominant party gets their way
D. O Communication is approached with a "win-win" mentality, as long as all parties get their
point across

Answers

Answer:

A

Explanation:

because if both parties feel safe communicating and feel understood by the other party they feel safe trusting the other person and it develops a trust worthy relationship

Trust can be built in a relationship if there is transparency, both parties feel listened to and understood, communication is approached with a "win-win" mentality, and all parties assume their due responsibility for problems and issues. Thus, option (a) is correct.

What is relationship?

The term relationship was to maintain of the person. The relationship was the measure of the one parties to the another parties. The relationship was the included of the two members. The friends and the family are the included of the relationship. The relationship was the necessary.

The two participants in the relationship-building process were transparent with one another. They experience being heard and understood. They are explained to the people who are approached with a "win-win" perspective. All of the parties involved's concerns and difficulties fall under their proper jurisdiction.

Therefore, option (a) is correct.

Learn more about on relationship, here:

https://brainly.com/question/23752761

#SPJ2

Can a host have more than one IPv4 address? Explain.

Answers

Answer:

Yes.

Explanation:

This is referred to as multihoming. Typically you use this when you want to connect to multiple networks. Also when you use VPNs, you have a separate IP address per VPN.

write a program to accept a name and roll number of 5 student using structure in C​

Answers

Answer:

This C program is to store and display the information of a student using structure i.e. to store and display the roll number,name,age and fees of a student using structure.

Basically one should know how to write the syntax of a structure and the rest is just implementation of the programs done so far.

If you yet need a dry run of the program or any other query, then kindly leave a comment in the comment box or mail me, I would be more than happy to help you.

CODE

#include <stdio.h>

#include <string.h>

struct student {

char name[50];

int roll;

};

int main() {

struct student student1;

strcpy(student1.name, "Chris Hansen");

student1.roll = 38;

printf("Name: %s\nRoll number: %d\n", student1.name, student1.roll);

struct student student2;

strcpy(student2.name, "Edip Yuksel");

student2.roll = 19;

printf("Name: %s\nRoll number: %d\n", student2.name, student2.roll);

struct student student3;

strcpy(student3.name, "Skeeter Jean");

student3.roll = 57;

printf("Name: %s\nRoll number: %d\n", student3.name, student3.roll);

struct student student4;

strcpy(student4.name, "Sinbad Badr");

student4.roll = 114;

printf("Name: %s\nRoll number: %d\n", student4.name, student4.roll);

struct student student5;

strcpy(student5.name, "Titus Alexius");

student5.roll = 76;

printf("Name: %s\nRoll number: %d\n", student5.name, student5.roll);

return 0;

}

DISPLAY

Name: Chris Hansen

Roll number: 38

Name: Edip Yuksel

Roll number: 19

Name: Skeeter Jean

Roll number: 57

Name: Sinbad Badr

Roll number: 114

Name: Titus Alexius

Roll number: 76

EXPLANATION

Use string.h to access string functions for names.

Create a struct outside of the main on student name and roll number.

strcpy works for strings.

Create for 1 student and copy and paste for the others.

Display the name and roll number for each student.

what happens if none of the selector values match selector in a simple case expression in pl/sql

Answers

Answer:

If no values in WHERE clauses match the result of the selector in the CASE clause, the sequence of statements in the ELSE clause executes. ... When the IF THEN statement has no ELSE clause and the condition is not met, PL/SQL does nothing instead raising an error.

Explanation:

On what menu in Microsoft Word can you locate the Macro feature?
Group of answer choices

Review

Edit

Home

View

Answers

Answer:

View

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode

II. Print Mode

III. Drift Layout

The Microsoft Word developers has made it easy for their users to automate the tasks used frequently through the creation and execution of macros.

Basically, macros comprises of commands and instructions which may be grouped together as a single command to automatically execute a task. You can locate the Macro feature in the View tab of Microsoft Word.

Sites on the surface web are _____.
A. freely available to all users

B. home pages only

C. older pages that have not been updated

D. member-only sites

Answers

It’s A because surface website’s are available for everybody but the dark web is opposite

It should be noted that Sites on the surface web are A. freely available to all users.

What is Surface Web?

The Surface Web can be regarded as a portion of the World Wide Web which is accessible for  general public and it can be  searched with standard web search engines.

Therefore, option A is correct.

Learn more about Surface Web at:

https://brainly.com/question/4460083

A large multinational client has requested a design for a multi-region database. The master database will be in the EU (Frankfurt) region and databases will be located in 4 other regions to service local read traffic. The database should be a managed service including the replication. The solution should be cost-effective and secure. Which AWS service can deliver these requirements

Answers

Answer:

RDS with cross-region Read Replicas

Explanation:

The Amazon Web Service, popularly known as the AWS is a subsidiary company of the Amazon.com which provides various cloud computing platforms on demand and Application Programming Interface or the API to other companies, governments and individuals.

The Amazon web services provides an effective RDS. RDS stands for Relational Database Service. The Amazon RDS is used to set up as well as operate and scale relational database in cloud. It provides resizable capacity and cost effective database.

In the context, Amazon Wen Services  can deliver RDS with cross regional Read Replicas.

There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
social media use and at least one of the disadvantages. Do you think that the widespread use of social media is a good
thing over all? Why or why not?

Answers

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

Other Questions
Solve the inequality. Graph the solution. 5 < -1/5g is there anyone using this room today? into passive voice 6.PART B: Which of the following passages best supports the answer to Part A?A. Paragraph 9B. Paragraph 15C. Paragraph 19D. Paragraph 27 represent 56 divided by 8 =7 using subtraction. Explain your Answer What is the central idea of this passage?Ballet is a demanding art form that requires time and dedication to perfect. Ballet dancers must have great flexibility and body strength. Inaddition, a dancer must memorize every movement of the performance. A choreographer creates the ballet steps and helps the dancerslearn them. It may take years for a dancer to refine his or her movements.OA Learning ballet takes time and effort.OB. Each type of ballet requires different skillsOC Ballet requires dancers to memorize their moves,OD choreographers design a ballet performance. Please help i will do anything Smoking is the leading cause of fire-related deaths in the U.S.TrueFalse what is the Biogenesis Theory? Revolution + tilt = what What is the area of the circle above? IF YOU POST SPAM ILL REPORT YOUR COMMENT AS MUCH AS I CAN! In Game 1, Emerson struck out 30 times in 90 times at bat. In Game 2, he struck out 40 times in 120 times at bat. In Game 3, Emerson struck out42 times in 140 times at bat.Part ADrag numbers to complete the proportion to represent the percent of strike outs per at-bats.Numbers may be used once or not at all.11210023835035000.00Part BWhat percentage of times at bat did Emerson actually hit the ball? 2. Given square CANE with diagonalsintersecting at B. mZCNE = 3a + 2b,AC = 35, and CE = 6a + 5.Find the value of a +b. Factorize. 2a(5b-2c)- 3c (5b-2c) some people argue that air is not a economic good. Explain why you agree or disagree with this statement in4-5 complete sentences The original price for a jacket was 124.95. It is on sale for 20% off. Witch of the following gives the best estimate of the savings?A:25B:30C:20D:2Whoever has best explaining and gets it right I will give brainliest! Identify the underlined element in the following passage from the novel Bleak House by Charles Dickens."Fog everywhere. Fog flowing up the river, among green banks and meadows; fog rolling down the river, where it hangs defiled among theships and buildings of a great and dirty) city." (5 points)aPrepositional phraseObAbsolute phraseInfinitive phraseOdSentence fragment Write net ionic equations for the reaction that occurs when aqueous solutions of Lithium hydroxide, LiOH, with hydrobromic acid, HBr, undergo a neutralization reaction that produces salt and water. The value of acceleration due to gravity is less at the top of Mount Everest then that in the terai reason, why? The Greeks were the greatest doctors of ancient times.TrueFalse Why doesn't the earth block out the light between the sun and the moon during a normal month