how does the internet bring people farther apart
use a paragraph to answer the question​

Answers

Answer 1

Answer:

First of all you may not be able to see your friend in person and it gets very sad. Sometimes you call them but they don't answer you because they don't have enough time to talk or they have something else to do. They won't always want to be on the internet you know, they want to go outside and get a life and not be like the FRE-KIN T-I-K T-O-K-E-R-S WHO ARE CHILDREN AND BEING VERY STU-PID AND ARE TOTAL IDIOTS AND SAY STUFF THAT MAKE NO SENSE AND TRY TO GET ATTENTION. OH DON'T BRING TOWARDS THE GA-CHA IT SO TRASH. I still hate gacha :) and I am happy. Another thing is what some people post, you see you meet friends in real life and sometimes you get to know them but you don't know what they might be doing on the internet and another thing is that they post stuff that makes you feel uncomfortable and disgusted.


Related Questions

PLZ ANWER FAST!!!!

Use the drop-down tool to select the correct word or phrase.

How fast data travels on the network:

The ability of a network to recover after any type of failure:

Text within a document that is linked to other information available to the reader:

The way the network is laid out, including all the interconnections:

When all computers in a network are connected in a “star” formation:

A type of network that does not use a router but shares data directly between computers:

A unique location for a computer on the network:

Rules for how routers communicate with one another and send data:

Answers

It should be noted that the speed of fast data on a particular network is known as bandwidth.

The ability of a network to recover after any type of failure is known as fault tolerance.

Text within a document that is linked to other information available to the reader is called hypertext.

The way the network is laid out, including all the interconnections is known as network topology.

When all computers in a network are connected in a “star” formation, it's known as a star topology.

A type of network that does not use a router but shares data directly between computers is known as peer-to-peer.

A unique location for a computer on the network is known as the IP address.

Rules for how routers communicate with one another and send data are known as the router protocols.

Learn more about bandwidths on:

https://brainly.com/question/8154174

Answer:

Text within a document that is linked to other information available to the reader is called

✔ hypertext

.

A unique location for a computer on the network is its

✔ IP address

.

The

✔ fault tolerance

is the ability of a network to recover after any type of failure.

The computer that responds to requests from the client computer is known as the

✔ server

.

A

✔ queue

is an ordered list of tasks waiting to be performed.

Explanation:

just did it.

what is computer hardware part​

Answers

Answer:

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

Explanation:

Answer:

Computer hardware is the physical parts of a computer system that is visible.

The parts of computer hardware is Central processing unit, Monitor, Mouse, Keyboard, Computer data storage, Motherboard, Speakers and Mouse.

Hope that helps. x

100 POINTS!!!
what kind of laptop is compatible with my pc lol i want to do a dual pc setup and my budget is $500.
PC specs:
AMD Ryzen 7 1700X Eight-Core Processor 3.40 GHz
16 GB DIMM 1400 MHz RAM
Radeon RX580 Series

Answers

Answer:

Hmm.. Try researching, I'm sure you'll find something there..

A company purchases a flood insurance policy for its data center. What is its risk

management decision?

1) Mitigation

2) Acceptance

3) Avoidance

4) Transference

Answers

When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.

Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.

Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.

The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.

In conclusion, transference is a risk management decision that occurs when  a company purchases a flood insurance policy for its data center.

Read more on risk management here: https://brainly.com/question/13760012

In Scratch, what is used to create a picture that lies behind the characters in your game?
backgrounds
backdrops
rearviews
landscapes

Answers

Answer:

the answer to this queston is backdrops

What cable is used to connect devices together on a network?

Answers

Answer:

Ethernet crossover cable

Explanation:

.

what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE

Answers

girl i dont know figure it out pookie

Which item would a small business most likely used to meet its daily operational needs ?

Answers

They could use a Budget software

Answer:

Commercial, ready-to-use software

Explanation:

In addition to being fun, another reason that people have been creating games ever since they settled into communities is:
They keep us out of trouble.
They teach us to follow rules.
They teach cooperation.
They teach strategy and critical thinking.

if you want points just keep looking im asking questons liek crazy

Answers

Answer:

I am pretty sure it's D. to teach strategy and critical thinking.

Answer:

They teach strategy and critical thinking

Explanation:

PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP

8. Based on the following syntax, what is a likely output for this code snippet if "number" was 35.555

return count(amount_owed. 2)

O 35.555
O 35.55
O 36
O 40

Answers

Functions are code segments that are executed when called or invoked

The function definition is not given; so, the output of the program cannot be outrightly determined.

However, the following are the possible scenarios.

The program would return 35.55 if the 2 represents the digits after decimal.The program would return 36 if the 2 represents the significant digits.

It is unlikely for the program to return (a) 35.555 and (d) 40

Read more about functions at:

https://brainly.com/question/14284563

software that converts program written in other language into machine language​

Answers

Software Development Tools

Compiler which is a part of software development tools,converts High level programming language into binary code.(machine language)

how is integrating approach in done in teaching

Answers

Answer: Integrative learning is an approach where the learner brings together prior knowledge and experiences to support new knowledge and experiences.

Explanation:

Research.

Explain why you do not need expensive equipment to take pictures or record video?

Answers

Explanation:

Expensive equipment is not necessary because from a technical perspective as long as the device has a lens and a mic it should be able to take photos and videos.

Answer: No, you don't not need an expensive camera . It may have better quality or worst quality . A phone car record and take pictures. Using a Light Stand Can give you a better lighting and better angle so you don't have to hold it or put it on your table, lap, or desk.

Explanation: A lot of people think you need to own a good camera to take a good photograph. A more expensive camera can help, but certainly is not essential. To answer the question though, it is 'no' – the equipment really doesn't make any difference to the end result, but does affect the process of getting there.

Byeeeeeee Remember to stan BTS , Wear Your Mask, And Drink Water

I need help in php coding

Answers

How can i help you please post your question

How can I have a private conversation with no one knowing on my iPhone

Answers

Answer:

Just share a note by making one.

Explanation:

Thank you

Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?

Answers

The answer is Troubleshooting

Explain Importance of flowchart in computer programming

Answers

Answer:

Flow charts help programmers develop the most efficient coding because they can clearly see where the data is going to end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.

creds to study.com (please don't copy it work by word, make sure to paraphrase it. otherwise plagiarism is in the game.)

Explanation:

Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a total capacity of 512 words

Answers

size of block = 1 word = 8 bytes

number of blocks = size of cache / size of word

= 512 word /1 word = 512 blocks

In a two-way set associative cache, 2 blocks will form 1 set. So number of index = 512/2=256=2^8

Size of offset = 3 bits

size of index = 8 bits

Size of tag = 64-11=53 bits

Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).

Answers

Code:

Function GetBiggestValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2

Function Main() returns nothing
integer userVal1
integer userVal2
integer userVal3
integer bigValue

userVal1 = Get next input
userVal2 = Get next input
userVal3 = Get next input

bigValue = GetBiggestValue(userVal1, userVal2)
bigValue = GetBiggestValue(bigValue, userVal3)

Put "Max value: " to output
Put bigValue to output

why the computer is known as versatile and diligent device ? explain.

Answers

Answer:

Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.

what is a computer software

Answers

Software is the digital operations performed by a computer’s hardware.

Answer:

Software is a collection of instructions that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.

Explanation:

Please mark as brainliest

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

What is the new programming language for developing iOS and Mac app

Answers

Answer:

Swift

Explanation:

I'm not sure about new, but IOS developers have been using Swift ever since the begining of time!

Please answer these questions.

Answers

For question 15 the answer is option C. I don't know the answers to the other questions

I need help right away pleas! 30 points.

A website layout needs to be simple and reasonably organized.

Answers:
A) Design
B) User-Friendly Website Navigation
C) Call to Action
D) Elements

Answers

Answer:

I'm very sorry if I'm wrong but I think it's A

I ate five M&Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
What is the estimated probability of green color?

Answers

Answer:

Below is code written in a free CAS (WxMaxima):

The above code creates the probability of 19 or more brown in the sample of 48 for population sizes from 5*19 to 10000 in steps of 5.

Here’s a plot of that data:

The horizontal blue line is the probability for an infinite population size (or, choosing each of the 48 M&Ms with replacement, which I infer is not what you meant). It is calculated using the binomial cdf:

The red curve approaches the blue line asymptotically as the population gets larger.

At population 10000, the red curve is

.

The NYC_Bicycle_Counts_2016_Corrected.csv gives information on bike traffic across a number of bridges in New York City. In this path, the analysis questions we would like you to answer are as follows: 1. You want to install sensors on the bridges to estimate overall traffic across all the bridges. But you only have enough budget to install sensors on three of the four bridges. Which bridges should you install the sensors on to get the best prediction of overall traffic

Answers

The ideal would be to install sensors on bridges at the main points of the city, to get a general idea about the traffic in the city.

We can arrive at this answer because:

The bridges that lead to the main points of the city tend to have more movement of people and vehicles.In this case, we can say that these bridges have more intense and constant traffic, which can promote a generalized view of traffic on other bridges.Therefore, by installing sensors to analyze traffic on these bridges, it would be possible to project the data collected from the sensors on less busy bridges, according to the context in which they apply.

In this case, the bridges that lead to commercial centers, highways, tourist places, and other important points of the city, must receive the censors.

You can find more information about traffic at this link:

https://brainly.com/question/10961490

business cards can be send to other outlook users as email attachments or........

Answers

Answer:

Hey man, here is the answer

Explanation:

The easiest route is Forwarding the existing conversation to another person. The previous thread will be quoted in the new message.

The method in the question appears to be for preserving the top-down reading structure of the existing thread, of which there is no way I'm aware of. Often times, the aforementioned method of simply forwarding an email is enough to impart some context to the person.

Alternatively, one might view the entire thread, and create a PDF of it (possible from the Print dialog box on a Mac, or to save as a PDF in the File/Edit menus in certain windows applications), which they could then send in an email.

def test() : # do not change this line!
values = [4, 7, 8, 9, -5] # do not change this line!

# write your code here so that it modifies values

# be sure to indent your code!

print(values)
return values # do not change this line!
# do not write any code below here

test() # do not change this line!
# do not remove this line!

Answers

I’m sorry this is unclear . What exactly do you need .

The second last character in a String str can be accessed by
a) str[-3]
b) str[-2]
c) str[2]
d) str[3]

Answers

Answer:

B.

Explanation:

-1 is the last element in a string. Starting from -1, count backwards and you get your answer.

Other Questions
Find the area of a rectangle & triangle! NEED HELP ASAP Translate ducimus. (2 points)we leadwe were ledwe will leadwe did lead what is the sum 1,826+2,149+1,023 3. The agricultural revolution led to the need for organizedA. Government B. Pest control C. Greenhouse gas reform D. Technological reform Community healthcare clinics often receive some level of government funding, so in many cases, they can __________. A. Purchase expensive medical equipment B. Offer financial assistance to low-income patients C. Hire hundreds of doctors D. Pay for more students to become doctors Please select the best answer from the choices provided. A B C D. which interest group is an example of a single-issue interest group? everytown for gun safety national league of cities center for health & gender equity american civil liberties union (aclu) The cafeteria made 19 mushroom pizzas and 57 pepperoni pizzas.What percentage of the pizzas were mushroom? How do different economic sections of society deal with water scarcity? Who is the most vulnerable to water scarcity? I recently surveyed seventh graders at Madison Middle School to determine how they used their cell phones. My goal was to determine which daily activities were the most popular. Out of 151 seventh graders in our school, 93 of them use smart phones. 57 of those students agreed to track their cell phones usage in a journal for three days. I compared journal statistics and gathered the following data.Data revealed that students spent 35 percent of their phone time playing games and using apps. These included games played alone and against friends. It also includes social media apps. Students spend 21 percent of their time texting and 20 percent of their time listening to music. Music included songs downloaded on their phones and music that streamed from other sources.14 percent of cell phone time was spent browsing the Internet while 9 percent of the time was spent using the phone to take photographs. Most ironically, students reported spending only 1 percent of their time using cell phones to make actual phone calls. The text and the graphic reflect the same student survey. Which information is found in both the text and the graphic? (AKA Screen Shot Below)1.Data representing the types of apps, games, and music that students used2.Data representing the name of the middle school and grade level of the participants3.An explanation of how the survey was conducted and the data was gathered4.An explanation about the total number of students who participated in the survey The Civil Rights Act of 1964 affected the lives of African Americans by:A. making racial intimidation and violence a federal crime.B. banning segregation in schools and forcing integration.C. outlawing discrimination on the basis of race.D. offering legal assistance to African Americans whose rights were violated. Analyze how Sparta laid the foundation for modern Military values Plz, help! I need help with questions a and b! Plz, write your answer in complete sentences! And the first person to answer will get a brainliest! Plz, NO SCAM links!!!!!! Mrs. Jones who has dementia. She continues to ask for her husband, whom you know passed away several years ago. How would you assist Mrs. Jones?" What is one discussion question for born a crime young readers book in chapters 17 and 18. The question cant have a one word answer.Cant be a yes/no answer.Cant be a question with a correct answer. me (5) A taxi is travelling at 15. m/s. Its driver accelerates with acceleration 3 m/s for 4 s. What is its new velocity? A car accelerates from 20 m/s to 30 m/s in 10 (a) Calculate the car's acceleration using v=utat. (b) Draw a velocity-time graph to show the car's motion. Find the distance it travels by calculating the area under the graph. (c) Check your answer by using the equation s = ut + hat Grade 9 Need help now pls on HS geometry I NEED HELP ASAPWrite the equation of the line in fully simplified slope-intercept form. If you don't sleep enough at night you will be very ____ in the morning. what is cubic spline? which function describes the arithmetic sequence shown -5,-7,-9,-11,-13