What is "social
comparison"?
A. When you compare your social life to others' social
life
B. When you compare your life to others' social media
posts and feel like your life is worse
C. When you compare your online posts to others'
online posts and feel like yours are worse
D. When you compare your life to others' online posts
and feel like your life is better

Answers

Answer 1

Answer:

A. When you compare your social life to others.

Answer 2

Answer:

A. When you compare your social life to others' sociallife...........


Related Questions

What technique do API developers most commonly use to limit access to an API to authorised individuals and applications?

Answers

Answer:

API keys

Explanation:

API (Application Programming Interface) is a computing interface that defines the interaction between multiple software intermediaries.

API key is a specific identifier use authenticate the developer user and call programs for the API.

The API keys often serve as a specific identifier and a secret token for authentication, and usually have a set of access rights to the API associated with it.

These are commonly used to authenticate a project with an API instead of a human user. Different platforms can execute and use API keys in different ways.

which of the following is something that an information systems (IS) professional would do? A. devise new ways to use computers B. turn information into meaningful decisions C. help people with their technology needs D. create and maintain computer network

Answers

Answer:B

Explanation:

it professionals build and repair computers, create and aunts in networks, and help people with their technology needs.

An example of something that an information systems (IS) professional would do is: B. turn information into meaningful decisions.

An information system (IS) can be defined as a set of components or computer systems, that is typically used to collect, store, and process data, as well as for the dissemination of information, knowledge, and the distribution of digital products.

Basically, an information system (IS) interacts with its environment by receiving data in raw forms while information are received in a usable format.

Generally, all organizations make use of an information system (IS) in the following areas:

Supply chain management.To process financial accounts.Manage their workforce.Marketing channels to reach their customers or potential customers.Transform information into meaningful decisions.

In conclusion, the transformation of an information into meaningful decisions that are in tandem with organizational goals and objectives is something that an information systems (IS) professional would do.

Read more here: https://brainly.com/question/25162387

Miguel, your system administrator, warns you of a new virus threat. This particular virus changes forms to avoid detection by antivirus software. What type of virus is it?

Answers

Answer:

I think it is Polymorphic virus.

To create a list to store integers, use:________

a. ArrayList list = new ArrayList();
b. ArrayList list = new ArrayList();
c. ArrayList list = new ArrayList();
d. ArrayList list = new ArrayList();

Answers

Answer:

ArrayList<Integer> list = new ArrayList<>();

Explanation:

From the list of given options a to d

ArrayList represents the list name

Also, the syntax is similar to java programming language. Hence, I'll answer this question base on the syntax of Java programming language.

In java, the syntax to declare a list is

[Variable-name]<list-type> list = [Variable-name]<list-type>();

Replace [Varable-name] with ArrayList

ArrayList<list-type> list = ArrayList<list-type>();

From the question, the list is meant to store integers;

So, replace list-type with integer...

This gives

ArrayList<Integer> list = new ArrayList<>();

The Google brand name appears on thousands of websites due to its ________ API. Select one: a. proprietary b. open source c. closed source d. user-controlled

Answers

Answer: open source

Explanation:

Typically, most applications that we run on our computer usually consist of a user interface. An application programming interface is also just an interface, which is not meant for users but rather applications.

The Google brand name appears on thousands of websites due to its open source API.

Which attitudes are most common among successful IT professionals?

Answers

Answer:

understanding the problem very well

writing documention to every piece of code you write

write clear and concise code

follow Industry accepted format for data storage

avoid recursion if possible

write modular code

Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was when the employee last performed a backup. Which type of network is the company more than likely using?

Answers

WWW/ World Wide Web.

In the development stages where an application is not yet sufficiently mature enough to be able to be placed into a test environment, which of the following techniques are applicable?

a. Static Binary Code Analysis and Manual Binary Review
b. Static Source Code Analysis and Manual Code Review
c. Dynamic Binary Code Analysis and Static Binary Review
d. Dynamic Source Code Analysis and Automatic Code Review

Answers

Answer:

A and C

Explanation:

which is the correct APA format in books?​

Answers

Answer:

It includes the author's last name, the year, and  a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case

The APA in-text citation for a book includes the author's last name, the year, and (if relevant) a page number. In the reference list, start with the author's last name and initials, followed by the year. The book title is written in sentence case (only capitalize the first word and any proper nouns).

Don't click on this I am testing

Answers

Don't click on this I am testing... I want the points so.

Answer:

ok

Explanation:

ATM machines respond to request in__________​

Answers

Answer:

Atm machine respond to request in atm card

ATM machines respond to requests in ATM card.

What is an ATM Machine?

ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.

ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.

Hence, the ATM card gives commands to the ATM machine.

Read more on atm machine:

https://brainly.com/question/24471380

#SPJ2

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n) __________ attack.

Answers

Answer:

"Advanced persistent threat " is the right one.

Explanation:

APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period. They represent compound channel assaults that use different components including various approaches of attack.

Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnoticed so they can continue to steal data c. conduct cyberwarfare d. reveal weaknesses in business and government websites and then force them offline

Answers

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

{Netiquette Question Worth 50 points}

[Which would be a responsible use of technology used by victims of cyber bullying]

•Finding ways to strike back at bullies online

•Buying software that allows them to track down bullies

•Changing passwords and screen names regularly

•pretending to be someone else to hide their identity

Answers

Answer:

Changing passwords and screen names regularly

Explanation:

I did it on edgenuity

utility software is also known as _____​

Answers

Answer:

Utility programs

Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should he use as the search query to find the results he needs?

a. Emperor penguins
b. Penguin colony
c. Emperor penguin large group
d. Emperor penguin family

Answers

Answer:

d. Emperor penguin family or b. Penguin colony

_is a computer network created for an individual person

Answers

Answer:

Personal area network

Explanation:

is correct 100% sure

Surrendering to digital distractions will likely result in learning more material. O False True​

Answers

Answer:True

Explanation:

What should you do if you copy a sentence from a book into a document
you are writing for your employer?
A. Ask your boss to read the document.
B. Give credit to the author for the work you used in your document.
C. Check the spelling of your document.
ОА
OB
Ос
HINT
SUBMIT
PREVIOUS
5 of 18
here to search
A
The

Answers

Answer:

Your answer is going to be B

How does Google work, why does it work that way?

Answers

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

A computer professional who designs ways to organize, store, and retrieve data is a database .

Answers

Answer:

Database Designer

Explanation:

Database design means organization of data as per the database model. The database designer what data should be stored and how the various data elements interrelate.

A database designer designs database design that includes indexes, tables, constraints, views, procedures, triggers and other constructs needed to store, retrieve and delete persistent objects.

One can become a database designer by following the below mentioned steps:

Earn a Bachelor's Degree in a Related Field Or Gain Foundational Training.

First earn a Bachelor's degree

Gain real world database development experience.

Acquire IT Database certifications and develop Soft Skills

Which statement best describes what you would be aware of when you copy or move files from one place to another place?

Answers

Answer: The files are copied from the main folder or destination folder and pasted on another location or folder.

Explanation:

The files can be moved automatically from one folder to another. The files are then can be copied from one folder and pasted on another. The new file destination allows the automatic file renaming. The file can be erased or removed from the previous location. Copying a file is a means of content duplication.

What is one way you might code-switch when posting a comment to a class discussion?

Answers

Answer:

The term code switching has been expanded and can encapsulate in any situation that speaker find to be switch from vocabulary.

Explanation:

It is a truly remarkable skill when you communicate your emotions, thoughts and opinion to others. It does not mean that we just to communicate our language but our language influence our thought, emotions and language and self identity.

we communicate our culture that is reflected in our language. Our language tells that who we are and from where we comes.

Code switching is related to the speakers alternates use of multiple language. in the one communication.

For example: Grace for beautiful gift ( Esta awesome).

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

Answers

Answer:

overclocking.

You should check your cooling when doing this, otherwise you can burn your processor.

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery

Answers

Complete Question:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease ____ are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Group of answer choices

A. servers

B. PaaS

C. IaaS

D. SaaS

Answer:

D. SaaS

Explanation:

Advances in cloud computing have opened a new field in application redundancy and backup. Because organizations that lease software as a service (SaaS) are in effect using a preconfigured set of applications on someone else's systems, it is reasonable to ask that the service agreement include contingencies for recovery.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

Answers

Answer:

Ram or random access memory

Explanation:

Which of the following is true about ethical issues in graphic design?
A. Ethical issues force designers to create unbiased designs.
B. Unethical behavior rarely occurs in the graphic design industry.
C. Closely imitating the work of another designer is considered unethical.
D. Understanding ethical issues reduce the amount of design work that is plagiarized.

Answers

Answer: The Answer Is B

Explanation:

I Did It On Edge

It should be B) Unethical behavior rarely occurs in the graphic design industry, i got it right on Edge

Also im sorry im a month late

Why is taking care of your camera important?

Answers

taking care of your camera is important for keeping the camera functioning properly and lasting a long time.

Explain why computer users should use the cloud?

Answers

Developing in the cloud enables users to get their applications to market quickly. Hardware failures do not result in data loss because of networked backups. Cloud computing uses remote resources, saving organizations the cost of servers and other equipment.

Other Questions
A car uses 150 litres of petrol in 45 minutes. How many litres of petrol will it use in 1 hour? this is my third time posting this bc i kept getting the wrong answer please help me PLEASE HELP I AM GIVING MORE POINTS THAN I SHOULD PLEASE HELPWrite the equation of the parabola in vertex form. vertex (4,1), point (3,-1) 1. The ratio of boys to girls in the seventh grade is 2:3. If there are 24 boys, how many girls are there? given P(x)=x^2+x+1 find answer P(7) 3. Ann wants to paste 18 posters on her bedroom wall. She wants to put the samenumber of posters in each row. How many rows could Ann make, 4.5, 9 or 10? What proposal was at the heart of the Virginia Plan? a. Establishing three branches of government, with the strongest being the executive branch and the president having the most power in appointing all members of other branches b. Amending the Articles of Confederation to strengthen the national government and weaken states' representation in Congress c. Establishing three branches of government, with the strongest being the legislative branch, which would consist of two houses and would choose the executive and judicial branches d. Amending the Articles of Confederation to strengthen the national government and still protect the interests of small states What made the Proclamation of 1768 different from the Proclamation of 1763? What states border Oregon? A firm is operating in the United States with only two other competitors in the industry. a. It is likely this industry would be characterized as: what is burning considered ? What is the difference between a rectangle and a cube? A rectangle is a 3-dimensional and a cube is a 2-dimensional. A rectangle and a cube are both 2-dimensional. A rectangle is a 2-dimensional and a cube is a 3-dimensional A rectangle and a cube are both 3-dimensional. lord Baltimore was made the proprietor of Maryland by The absolute value of 8 is How many milliliters of milk are in a 1.000-gallon jug? Solve 3[-x + (2 x + 1)] = x - 1. Question 310 ptsWhich statement identifies a cultural reason for the Europeanexploration and colonization of the Americas?A) European merchants believed that the discovery of a Northwest Passage to Asiawould provide them with expanded trading opportunities.B)France and Spain wanted to convert American Indians to Catholicism, while someEnglish subjects wanted to practice their own religion freely.C) Europeans explored and colonized the Americas because they disagreed with theirgovernmentsD) European settlers were able to increase their wealth by finding gold and silver,engaging in the fur trade, and claiming land Recent decades have seen a trend toward globalization, which means that buying and selling in markets have crossed national borders to an increasing extent. List three reasons and briefly describe their effect contributing toward globalization. Provide examples and explain your answer. Solve the equation: 11x - 3 = 5x + 11 an individuals health is predetermined by and his or hers choices do not influence health