Which subject line for this informational e-mail would be most suitable? a. The Upcoming Lunch & Learn Program Is in March. b. Important Announcement About Nutrition! c. Lunch & Learn: Surviving in the Fast Food Lane

Answers

Answer 1

The subject line for this informational e-mail that would be most suitable is: "Surviving in the Fast Food Lane"

Why is this so?

This is because Fast Food has become a major topic in the United States. People want to get healthy food fast. This is because they are now more aware than before the impact of poor diet on the body.

Hence the above caption will get attention easily.

The subject line of an email is the one line of text that recipients view when they open it. This one line of content may frequently determine whether an email is opened or discarded, so make sure it's tailored for your target audience.

Learn more about Subject line:
https://brainly.com/question/3605010?
#SPJ1


Related Questions

PLS ANSWER NOW QUICKLY!!!!
If the car can recognize and have an understanding or estimation of more information about the people involved should that influence the decision that is made? To clarify with an example: if the car’s software can recognize that a pedestrian is a mother with two children in a stroller or a pregnant woman, should that be factored into the decision that is made by the software? Why or why not?

Answers

Ethical implications of recognizing vulnerable individuals in autonomous vehicle decision-making

The use of additional information in the decision-making process of an autonomous vehicle raises ethical and moral questions. Recognizing and prioritizing the safety of vulnerable individuals at risk of injury in an accident ensures safety.

Using such information could raise concerns about privacy, bias, and discrimination. The technology used to recognize and understand pedestrians may need to be more accurate and could lead to incorrect decisions or unintended consequences.

Relying on this information could perpetuate existing biases and inequalities, such as prioritizing the safety of specific individuals over others based on their perceived vulnerability.

The decision to factor should consider the potential benefits and risks and an ethical framework that prioritizes safety while considering the rights and dignity of individuals.

Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?

Answers

Answer:

I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.

Explanation:

I went into the PowerPoint and did it myself.

Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain access reconnaissance enumeration

Answers

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

What is maintaining access in penetration testing?

Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

https://brainly.com/question/26555003

#SPJ1

Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in the inheritance tree, including Book, Report, Newspaper, etc. What is the best way to create a linked list using PublListNode and Publication classes

Answers

The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

What is a root class?

A root class is known to be inherited and it is one that defines an interface and behavior that are specific to all objects in any given hierarchy.

Note that The best way to create a linked list using PublListNode and Publication classes is the use of the PublListNode class contains the Publication class.

See options below

A.

The PublListNode class contains the Publication class.

B.

The Publication class is derived from the PublListNode class.

C.

The PublListNode class is derived from the Publication class.

D.

The Publication class contains the PublListNode class.

Learn more about root class from

https://brainly.com/question/14551375

#SPJ1

Use of the Internet for e-government has increased. Identify the benefits by checking all of the boxes that apply.
A. It keeps the public informed about events
B. People do not have to vote
C. People can pay bills
D. People do not have to visit the site
E. The government can share important information about issues with the people in that town.

Answers

It’s A my good guy have a great day

Answer:

the answer is A C and E

Explanation:

give me at least five main characteristic of irrigation equipment​

Answers

Answer:

flow control devices

filters

fertigation equipment

water emitters

automation equipment

operation equipment

water-lifting devices.

How are computers used in education and entertainment? List them.​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

              "computers used in education and entertainment"

Computers started as very and simplistic machines data.Most of these files were text-based reports used in a work environment.As technology advanced,computer became increasingly versatile in what they could do.With the creation of the internet and faster processors,file sharing and entertainment became a popular use for personal computer everywhere.Computer have endless users in the entertainment industry by directly marketing products to users.

MusicTelevision and moviesArtGames

Many websites services allow users to purchase individual tracks or albums directly to their computer.Most record labels take advantage of these services to makeup for lost revenue from illegal downloading.

When the advantages of video card and internet speed,moving and streaming television are now at the click of a mouse button.Some websites even offer free streaming episodes of certain TV series with internet commercials.

Art is something that is readily available online at any moment. Pictures,Painting,Poetry and more are just a click away.Popular browsers offer specific image search option to quickly browse through art with a single keyword.Beside general use,computer photo editing programs and animation programs are also the sources behind most movies and professional photographs.

What is the output of the following program?
import java.util.Date;
public class Test {
public static void main(String[] args) {
Date date = new Date(1234567);
m1(date);
System.out.print(date.getTime() + " ");
m2(date);
System.out.println(date.getTime());
}
public static void m1(Date date) {
date = new Date(7654321);
}
public static void m2(Date date) {
date.setTime(7654321);
}
}

Answers

The output of the given Java program will be "1234567 7654321".

In the given Java program, the main method creates a Date object named "date" initialized with the value 1234567, representing a specific point in time. The program then calls the m1() method, which assigns a new Date object with the value 7654321 to the "date" variable within the method. However, this assignment does not affect the original "date" object in the main method.

Next, the Java program calls the m2() method, which modifies the value of the "date" object using its setTime() method, setting it to 7654321. This change affects the original "date" object in the main method.

Finally, the program prints the result of calling date.getTime(), which returns the time value of the "date" object. The first print statement displays 1234567, representing the original value of the "date" object. The second print statement displays 7654321, reflecting the updated value after calling m2().

To know more about Java program click here brainly.com/question/26789430

#SPJ11

What are the features of G-mail

(Write in your own words)​

Answers

Answer:

here is what I think!

Explanation:

G-mail is:

secureeasy to usefastcan be used to sign in anywhere!(including brainly)you don't need to pay when creating onecan help you in billing and buying apps and their paid productyou can use it because why no!some websites need G-mail to be used

thats why you should use G-mail

tell me if you have an idea!

Answer:

Mute annoyingly noisy email threads

It's really easy to use

Snooze so you don't forget

Explanation:

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

functions of operating systems​

Answers

Answer:

The functions of operating system are:

Explanation:

It protects the user to create,copy,delete,move& rename files & folders.

It protects the stored information from unauthorized users & denies them access to data.

It manages the storage and retrieval of data from disks.

It manages the input to and output form of computer system.

Loan Payment Schedule Main Street Bank is offering an annual interest rate discount based on the client's credit score. The discount for each credit score level is provided in the table below. The lowest credit score is 300 while the highest credit score is 850. For example, the new interest rate for a client with a credit score of 755 and a current interest rate of 4.25% would be 4.25 - 0.75 = 3.50% interest rate Credit Score Rating Interest Rate Discount 300 - 579 Very Poor 0.00 580 - 669 Fair 0.25 670 - 739 Good 0.50 740 - 799 Very Good 0.75 800 - 850 Exceptional 1.00 Use modular programming concepts Create a program that includes a WHILE loop to generate a payment schedule for loans that are paid in equal monthly payments Input the loan number and retrieve required loan account from MS_LOANS table Output is shown below Monthly interest is calculated by dividing the yearly interest rate by 12 to get a monthly interest rate. Then, divide the monthly interest rate by 100 to get a percent monthly interest rate Balance is previous balance plus monthly interest minus monthly payment Make sure to handle the final payment Calculate the number of years and months to pay loan Include exception handling including the WHEN OTHERS exception handler to trap all errors Input 31993564 Output: 31993568 Exception Handling: Input: 31993565 Output:Need this question answer for APEX ORACLE with all point that mention and give same output as shown in pic please check code is proper and working correctly and send answer ASAP!.

Answers

The solution to the question is given below: Here is the code for the given question:```
DECLARE
 l_ln_num NUMBER := &loan_num;
 l_loan_amt NUMBER;
 l_yearly_rate NUMBER;
 l_credit_score NUMBER;
 l_current_rate NUMBER;
 l_duration NUMBER;
 l_monthly_payment NUMBER := &monthly_payment;
 l_balance NUMBER := 0;
 l_monthly_interest NUMBER := 0;
 l_loan_id NUMBER := 0;
 l_years NUMBER;
 l_months NUMBER;
BEGIN
 SELECT loan_amount, yearly_rate, credit_score, current_rate, duration, loan_id
 INTO l_loan_amt, l_yearly_rate, l_credit_score, l_current_rate, l_duration, l_loan_id
 FROM ms_loans
 WHERE loan_number = l_ln_num;
 l_current_rate := l_yearly_rate -
   (CASE
     WHEN l_credit_score BETWEEN 300 AND 579 THEN 0.00
     WHEN l_credit_score BETWEEN 580 AND 669 THEN 0.25
     WHEN l_credit_score BETWEEN 670 AND 739 THEN 0.50
     WHEN l_credit_score BETWEEN 740 AND 799 THEN 0.75
     WHEN l_credit_score BETWEEN 800 AND 850 THEN 1.00
     ELSE 0.00
   END);
 l_duration := l_duration*12;
 l_monthly_interest := l_current_rate/12/100;
 l_balance := l_loan_amt;
 DBMS_OUTPUT.PUT_LINE('Payment Schedule for Loan Number: '||l_ln_num);
 DBMS_OUTPUT.PUT_LINE('Yearly Interest Rate: '||l_yearly_rate||'%');
 DBMS_OUTPUT.PUT_LINE('Credit Score: '||l_credit_score);
 DBMS_OUTPUT.PUT_LINE('Duration in Months: '||l_duration);
 DBMS_OUTPUT.PUT_LINE('Monthly Payment: '||l_monthly_payment);
 DBMS_OUTPUT.PUT_LINE('Starting Balance: '||l_balance);
 l_months := 0;
 WHILE l_balance > 0 LOOP
   l_months := l_months + 1;
   l_years := TRUNC(l_months/12);
   IF MOD(l_months, 12) = 0 THEN
     DBMS_OUTPUT.PUT_LINE('Year '||l_years);
     DBMS_OUTPUT.PUT_LINE('--------');
   END IF;
   DBMS_OUTPUT.PUT_LINE('Month '||l_months);
   DBMS_OUTPUT.PUT_LINE('--------');
   DBMS_OUTPUT.PUT_LINE('Current Balance: '||TO_CHAR(l_balance, '$99,999,999.99'));
   DBMS_OUTPUT.PUT_LINE('Monthly Interest: '||TO_CHAR(l_monthly_interest*100, '999.99')||'%');
   l_balance := l_balance*(1+l_monthly_interest)-l_monthly_payment;
   IF l_balance < 0 THEN
     l_balance := 0;
     l_monthly_payment := l_balance*(1+l_monthly_interest);
   END IF;
   DBMS_OUTPUT.PUT_LINE('Ending Balance: '||TO_CHAR(l_balance, '$99,999,999.99'));
   DBMS_OUTPUT.PUT_LINE('Payment Due: '||TO_CHAR(l_monthly_payment, '$99,999.99'));
   DBMS_OUTPUT.PUT_LINE(' ');
 END LOOP;
 
 UPDATE ms_loans
 SET duration = l_years
 WHERE loan_id = l_loan_id;
 
EXCEPTION
 WHEN OTHERS THEN
   DBMS_OUTPUT.PUT_LINE('Error Occured: '||SQLERRM);
END;
```

To know more about code visit:

https://brainly.com/question/17204194

#SPJ11

Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers stops when the first negative or zero value is entered by the user. The function then prints the two largest values entered by the user. If fewer than two distinct positive numbers are entered a message to that effect is printed instead of printing any numbers. Hint: Duplicates will cause problems. Try to make sure that you find a way to ignore them.

Answers

Answer:

The function in Python is as follows:

def printTwoLargest():

   chk = 0

   list1 = []

   num = int(input("Enter: "))

   while num > 0:

       for i in list1:

           if i == num:

               chk+=1

               break;

       if chk == 0:

           list1.append(num)

       chk = 0

       num = int(input("Enter: "))

   list1.sort()

   if len(list1) >= 2:

       print("Largest:", list1[-1])

       print("Second:", list1[-2])

   else:

       print("Length of list must be at least 2")

Explanation:

This defines the function

def printTwoLargest():

This initializes a check variable to 0

   chk = 0

This initializes an empty list

   list1 = []

This prompts the user for input

   num = int(input("Enter: "))

The following loop is repeated until input is 0 or negative

   while num > 0:

The following for loop checks for duplicate

       for i in list1:

           if i == num: If duplicate is found

               chk+=1 The check variable is set to 1

               break; And the for loop is exited

The input is appended to the list if the check variable is 0 (i.e. no duplicate)

       if chk == 0:

           list1.append(num)

This sets the check variable back to 0, for another input

       chk = 0

This prompts the user for another input

       num = int(input("Enter: "))

This sorts the list

   list1.sort()

This prints the two largest if valid user input is 2 or more

   if len(list1) >= 2:

       print("Largest:", list1[-1])

       print("Second:", list1[-2])

if otherwise, this prints that the length must be at least 2

   else:

       print("Length of list must be at least 2")

An IP subnetting design effort is under way at a company. So far, the senior engineer has decided to use Class B network 172.23.0.0. The design calls for 100 subnets, with the largest subnet needing 500 hosts. Management requires that the design accommodate 50 percent growth in the number of subnets and the size of the largest subnet. The requirements also state that a single mask must be used throughout the Class B network. How many masks meet the requirements

Answers

Answer:

The answer is "0".

Explanation:

The mask should describe sufficient subnet bits for build 150 subnet masks with 50% development. The Mask thus needs a minimum of 8 subnet bits (7 subnet bits supply 27, or 128, subnets, and 8 subnet bits supply 28, or 256, subnets). Similarly, such a need to grow by 50% of its size of the main subnet needs, that host part to amount to 750 hosts/subnet. There's not enough 9 host bits (29 - 2 = 510), yet 10 network bits have 1022 host(s)/subnet (210 – 2 = 1022). This same maximum mask project requires to be 34 bits, (at least) in the form of 16 network bits, because of the Class B network, but there are only 32 bits, therefore no single mask meets its requirements.

One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data transmissions required by the Internet. while it works well for television signals, it is ineffective for data transmissions required by the Internet. none of the available options are true. none of the available options are true. it is incompatible with most modern communication systems. it is incompatible with most modern communication systems. systems used by many providers require customers to share bandwidth with neighbors. systems used by many providers require customers to share bandwidth with neighbors.

Answers

Answer:

systems used by many providers require customers to share bandwidth with neighbors

Explanation:

One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.

have you gone/done into things that you forget to close/settle?​​

Answers

Answer: AT SOME CIRCUMSTANCES YES

Explanation: WELL ONE EXAMPLE WAS OUR GAMING GROUP WHICH WAS MADE OF ABOUT 2 YEARS AGO AND THERE ARE STILL TO PEOPLE IN THE GROUP WHEN WE DON'T EVEN USE ANYMORE , CAN YOU BELIEVE IT ?

Energy bill calculator problem:
3 points.
Write a subroutine that will output the raw cost of energy usage by taking three parameters: previous meter reading, current reading and calorific value.
The units used equals the current reading minus the previous reading.
kWh = units used * 1.022 * calorific value divided by 3.6.
The calorific value varies a little by each supplier, are governed by legislation and provided by the National Grid. Assume a value of 39.3.
Energy is charged at 2.84p per kWh.
You do not need to format the output because the result is the input to further calculations.

Answers

Below is a Python subroutine that takes in the previous meter reading, current reading, and calorific value as parameters, and outputs the raw cost of energy usage:

What is the Energy bill?

python

def calculate_energy_cost(prev_reading, curr_reading, calorific_value):

   units_used = curr_reading - prev_reading

   kwh = units_used * 1.022 * calorific_value / 3.6

   cost = kwh * 0.0284

   return cost

To use this subroutine, simply call it with the appropriate parameters. For example:

python

prev_reading = 1000

curr_reading = 1200

calorific_value = 39.3

raw_cost = calculate_energy_cost(prev_reading, curr_reading, calorific_value)

print(raw_cost)

This would output the raw cost of energy usage based on the given meter readings and calorific value. Note that the output is in pounds and pence, since the cost per kWh is in pence. If you need the output in a different currency or format, you'll need to modify the subroutine accordingly.

Read more about Energy here:

https://brainly.com/question/13881533

#SPJ1

as we move up a energy pyrimad the amount of a energy avaliable to each level of consumers

Answers

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

You work as the IT security administrator for a small corporate network. You recently placed a web server in the DMZ. You need to configure the perimeter firewall on the network security appliance to allow access to the web server from the LAN and the WAN. You would also like to improve security by utilizing the attack security features provided by the firewall.

Answers

As an IT security administrator, you may configure the network security appliance's perimeter firewall to enable access to the web server in the DMZ from both the LAN and the WAN. To do this and boost security by utilizing the firewall's attack security capabilities, take the following steps:

1. Determine the IP address of the web server in the DMZ as well as the precise ports that must be opened (e.g., port 80 for HTTP and port 443 for HTTPS).

2. Log in to the firewall's administration interface and browse the firewall rules or policies setup area.

3. Set a new firewall rule or policy that allows inbound LAN and WAN traffic to the web server's IP address and specified ports.

4. Activate the attack security elements of the firewall, such as an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS), to monitor and defend the web server from potential attacks.

5. Set up the IDS/IPS rules or signatures to identify and prevent typical web server threats including SQL injection, cross-site scripting (XSS), and Distributed Denial of Service (DDoS).

6. Make the modifications and test the web server's connectivity from both the LAN and the WAN to confirm it is accessible and functional.

By following these steps, you can configure the perimeter firewall to enable access to the web server in the DMZ from the LAN and WAN while simultaneously boosting security by utilizing the firewall's attack security capabilities.

Learn more about Windows Firewall:

https://brainly.com/question/30826838

#SPJ11

who loves juice wld as much as i do?

Answers

Answer:

ehhh he was ok

Explanation:

Answer:abc

Explanation:

What are the most important benefits of using virtual reality in business training?.

Answers

Virtual reality is actually an artificial environment created with software and presented to a user that accepts it as a real environment.

For every business organization, training and development programs are considered very important for success. These kinds of programs are critical for organizations where employee mistakes can cause harm. Basically, virtual reality technology can enable employees to practice events that could help in lifelike scenarios.

Virtual reality could also be used by workers who need disaster training. Virtual reality can be used in various fields like education, medicine, business, etc. It also provides stakeholders, employees, etc an experience of the real-world environment. It also creates customized training programs and improves sales.

Therefore, Virtual reality is benefiting business organizations in many different ways.

You can learn more about virtual reality at

https://brainly.com/question/13269501

#SPJ4

what is a major difference between cyber vandalism and online priacy

Answers

Answer:

There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Answer:

Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Explanation:

a p e x

Which are effective thesis statements? Check all that apply.
In this paper, I will talk about healthy foods.
Adopting a positive attitude can reduce stress, prevent anxiety, and help you lead a better life.
Video games can teach important values such as teamwork, perseverance, and dedication.
This paper will show the many ways technology can help people lead healthier lives.
Electives classes are very popular in high schools.
O Sugary drinks, snacks, and desserts should be avoided.

Answers

Question:

Which are effective thesis statements? Check all that apply.

Options:

In this paper, I will talk about healthy foods. Adopting a positive attitude can reduce stress, prevent anxiety, and help you lead a better life. Video games can teach important values such as teamwork, perseverance, and dedication. This paper will show the many ways technology can help people lead healthier lives. Electives classes are very popular in high schools. Sugary drinks, snacks, and desserts should be avoided.

Answer:

B.) Adopting a positive attitude can reduce stress, prevent anxiety, and help you lead a better life.

C.) Video games can teach important values such as teamwork, perseverance, and dedication.

D.) This paper will show the many ways technology can help people lead healthier lives.

Explanation:

I just did the assignment on edge 202 and got it right!

The effective thesis statements are :

The adopting of the positive attitude can reduce the stress, Video games can teach us important values such as teamwork,technology can help people lead healthier lives. What is a thesis?

A thesis or a dissertation is research that is done by the candidate for taking an academic degree.

The research is usually done to find a solution to the problem or the hypothesis. The thesis is thus a work of art that explains the details of reaserach.

The above statement tells us that a positive attitude can reduce stress. Video games teach us teamwork and technology is making lives healthier.

Find out more information about the thesis.

brainly.com/question/17915079

compare and contrast science and technology

Answers

Answer:

Comparisons: Science and technology are always two things that are being constantly refined. They are also quite useful things to know in day to day life. However, technology depends on science. Science is more conceptual than technology; technology is a thing, while science is a concept of knowledge.

How has cell phones impacted our society.

i really need this please.

Answers

Cell phones have impacted the society very much. Cell phones help us communicate with people that aren’t so close by us. Cell phones have changed so much over generations and have let us understand the way the internet works nowadays.
Cell phones have impacted our society because now we can text someone without having to see them and we can also call someone from far away and that is always good because some people can’t see their friends or family. Also people spend lots of time on cell phones. We can also now take pictures and capture moments.

Hope this helped

+10 points~~~Which option is used in emails to inform the recipient that they should exercise discretion in accordance with sharing the content of the message?

priority levels
sensitivity levels
follow-up flags
attachment icons

Answers

Answer:

Sensitivity Levels

Explanation:

Sensitivity Level is option use in email to inform the recipient that they should exercise discretion in accordance with sharing the content of the message.

Answer:

its sensitivity levels on edge 2020

Explanation:

ANY ADVICE?
i have to spend summer ( and the next 4 years) with a family who hates me. what should I do.

Answers

Answer:

Talk to a close friend or adult that you trust and have the power and explain to them why you don't want to go. Good luck.

Answer:

You should try talking to a person that could maybe help you or a family member that you trust who will let you stay with them for the summer and 4 years. If you don't have any one else I would try being nice, or just ignore them and live on with your life. I don't really know what else to say sense I don't know your life experience.

Explanation:

what is computer? Write is features




Answers

Explanation:

A computer is an machine that accepts data as input,processes that data using programs, and outputs the processes the data as information.

the features are

1) speed

2) accuracy

3) versatility

4) multi tasking

5) reliability

What is humanity’s greatest invention?

Answers

Answer:

Technically the human

Explanation:

Women are a big portion of humanity and without them there wouldn't be Albert Einstein or anyone....

Cereal bananas I love bananas my fav lol

Discussion Topic
How does social media affect the process of globalization? Give examples. In what
ways does social media help in creating global communities? Discuss other positive
influences of social media. What might be the adverse effects of excessive use of social
media?

Answers

Answer:

Social media positively affects and impacts the process of globalization. ... Global communities is a social infrastructure tool and as social media helps in strengthening social relationships and bringing people and communities together it leads to creating a string global community.

Other Questions
In the diagram, which pair of angles are vertical angles?A transversal intersects 2 lines to form 8 angles. Clockwise from the top, the angles are 1, 2, 3, 4; 5, 6, 7, 8.Angle 1 and Angle 2Angle 4 and Angle 6Angle 6 and Angle 8Angle 5 and Angle 3 how to solve tombsone issue with reference counters Supporters of using the atomic bomb against Japan believed it would it Slaves and women during Hammurabi's day had less rights than free men. True or false What three things did the Lend-Lease Act authorize and allow the US to do with war materials? Members of a school club are buying matching shirts. They know at least 25 members will get a shirt. Long-sleeved shirts are $10 each and short-sleeved shirts are $5 each. The club can spend no more than $165. What are the minimum and maximum numbers of long-sleeved shirts that can be purchased?A minimum of long-sleeved shirts can be purchased.A maximum of long-sleeved shirts can be purchased. Help picture below problem 15 Question in picture!! Show all work! what if? what would be the new angular momentum of the system (in kg m2/s) if each of the masses were instead a solid sphere 10.5 cm in diameter? (round your answer to at least two decimal places.) Without using the average function, create a formula in the cell H4 that gets the SUM of the values in the cell E4 through G4 and divides the sum by three. A 14cm diameter champagne bottle rests on its side on top of a frictionless table. Suddenly, the cork pops and the bottle slides backward for a distance of 22.0 cm in 0.44s. If the mass of the bottle is 500 times the mass of the cork, find the distance from the original position the cork will land on the table. help omg, it would suck if anyone with big mommy milkers can teach me the answer ANNOTATE THREE "IMPORTANT" PAGES OF CURIOUS, INCLUDING-VOICE (SYNTAX AND DICTION)-THE THEME OF TRUTH VS LIES of all the products produced in caribbean during the eighteenth century, __________ became a staple rather than a luxury good. can someone please tell me these answers What do you believe happened in the First World War that would eventually lead to the Second World War? Give support towards your answers. The equation of the line tangent to the curve at x=12 is Type answer in form y=mx+b. Note: You can earn partial credit on this problem. what is the square root of 465 A pickup truck travels 45 Mi on 2 and 1/3 gallons and goes19 miles on one gallon of gas. At that rate how far will it travel on 4 1/4 gallons of gas? if a number of holes are to be equally spaced on a circle, the exact location of the first hole is given by .a.related dimensionsb.connected dimensionsc.adjacent dimensionsd.location dimensions