How is advertising using social media different from using traditional advertising?

Answers

Answer 1

Answer: Social media marketing allows for more succesful and personalized messaging, but traditional marketing tactics are usually more static with a harder reach of audience.


Related Questions

Which definition of levels of is correct?
O A. voltage at which an audio device receives sound
B.
volume at which someone plays audio on a device
OC. voltage at which a device plays audio
OD. frequency of sound waves alternating on a device

Answers

Answer:

D. frequency of sound waves alternating on a device

Explanation:

Answer:

frequency of sound waves alternating on a device

Explanation:

You plan to write an app to find the best hiking trails for families. Which statement is true about this step?
You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.
You have defined a use case.
In this step, you defined your target audience and main goal.
Your app is functioning and ready to test.

Answers

The statements that are true about this step are:

In this step, you defined your target audience and main goal.You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen. Your app is functioning and ready to test.

Is it hard to create an app?

Most times, it often takes at least  4- 6 weeks to be a good Android developer. Note that a Basic developer skills are said to be not enough to build a commercial app and as thus, one need good training.

Conclusive, By knowing your target audience and  following the steps above, one can make a good hiking app.

Learn more about hiking from

https://brainly.com/question/16430743

Answer:

C:  in this step, you defined your target audience and main goal

Explanation:

got it right on edge

What are the different ways computers can process information?

Answers

To determine what to do with the instructions, the CPU goes through 4 steps to make sure the program runs without errors. The 4 steps are fetch, decode, execute and writeback.

Input, process, output, and storage are the the different ways computers can process information.


What is a computer?

A computer is a piece of computer components used to handle information or files. Data can be stored, retrieved, and processed by it. Maybe may already be aware of the fact you are able use a desktop to surf the Internet, send emails, type articles, and play online games.

The software directs but really the hardware actually does the information to output execution. Input, process, output, and storage are the four important information processing operations needed for a computerized system to operate.

Input, processing, as well as output are really the three phases of the computer. These stages are carried out by a computer "running" a code. A program comprises a set of detailed instructions that specify how the computer should process input to generate the desired result.

Learn more about computers, here:

https://brainly.com/question/21080395

#SPJ2

As of 2007, how many concentrated solar power plants did the United States have?

Answers

Answer:

12,718

Explanation:

Hope this helps! Let me know! :)

_________is a type of bullying that occurs when a person continuously pursues another and gives
unwanted attention

Answers

Answer:

stalking ?

Explanation:

Answer:

stalking

Explanation:

There are a series of factors and people who save Glenn Curtiss from
bankruptcy what are they

Answers

Answer: "Due to patent issue, he paid his worker from his pocket. He paid 10,000 dollars bond which led him towards bankruptcy, Curtiss, have no option, so he accepted the challenge to fly from Albany to Manhattan and won a prized of 10,000 dollars. "

short answer:

The Wright Brothers and the Challenge to fly.

Explanation: hope it helps!

An Acceptable Use Policy (AUP) are designed for the purpose of _____.
compressing files
maximizing processing power
safety
anonymity

Answers

Answer:

maximizing processing power

An  Acceptable Use Policy is made up for safety. Check more about the terms below.

What does an Acceptable Use Policy made up of ?

An acceptable use policy is one that is made up of a general statement that links to the safe and good use of email and the internet.

Note that based on the above, An  Acceptable Use Policy is made up for safety of all in the use of the internet.

Learn more about Policy from

https://brainly.com/question/3653791

#SPJ2

What is the difference between cipher block chaining mode and electronic code book mode?

Answers

ECB (Electronic Codebook) is essentially the first generation of the AES. It is the most basic form of block cipher encryption. CBC (Cipher Blocker Chaining) is an advanced form of block cipher encryption. With CBC mode encryption, each ciphertext block is dependent on all plaintext blocks processed up to that point.

Answer:

ECB (Electronic Codebook) is essentially the first generation of the AES. It is the most basic form of block cipher encryption.

CBC (Cipher Blocker Chaining) is an advanced form of block cipher encryption. With CBC mode encryption, each ciphertext block is dependent on all plaintext blocks processed up to that point.

Which of the following is NOT a benefit of pair-programming?
Code takes 15% less time to write than with a solo programmer.
Programs have fewer bugs than if written by a single programmer.
Code solutions are more creative.
o o
Bias in programs is reduced.

Answers

Answer:

Programs have fewer bugs than if written by a single programmer.

Explanation:

this is what I think personally

Coupled with risk reduction and knowledge sharing within an organization, pair programming is a key technique for producing faster, higher quality code. Thus, option B is correct.

What is the role pair programmer in the programs?

Two programmers collaborate at the same workstation while using the agile software development technique known as pair programming.

The observer or navigator reads each line of code as it is entered while the driver, who is also the code writer, types it in.

Pair programming is a method where two programmers collaborate on the same block of code while using just one computer.

This introduces the idea of pair programming roles, where one performs the function of the driver (writing code) and the other that of the navigator (ensuring the accuracy of the code).

Therefore, Programs have fewer bugs than if written by a single programmer.

Learn more about pair programmer here:

https://brainly.com/question/14190382

#SPJ2

Which of the following is an example of an output device on a smartphone?
the speaker
the microphone
the battery
the memory card

Answers

Answer:

The speaker

Explanation:

Speakers are output devices because the audio is taken from the app or website and playing it towards the speakers.

_________(fill in the blank)in online education is about making sure that all students are able to use all the technology in the course.
Equity
Ethics
Accessibility

Answers

Accessibility Llllllllllllllllllllllllllllllllll

Answer:Below

Explanation:

Where will a sprite On the Scratch website start at with coordinates (0,0)?

Answers

The answer to your question is stage center. Looking at the multiple choices, I think you should choose the answer, "the center of the screen". But I am not 100% sure if that's the right answer. Hope that helps.

Which platforms are used for mobile apps? Select 4 options.
BlackBerry
Bluetooth
iOS
Android
Windows

Answers

Answer:

- Blackberry

- iOS

- Android

- Windows

Explanation:

On Edge, it states, "There are two main operating systems used on mobile phones, Android and iOS (the Apple platform). There are also apps for Windows and BlackBerry."  (correct on Edge)

I hope this helped!

Good luck <3

Platforms used for mobile apps are

BlackBerryiOSAndroidWindowsWhat are Mobile Apps?On the mobile app, there are two main platforms namely iOS and Android.An application platform is defined as a framework of services that application programs on for standard operations. An application platform operates in five principal areas and they are development tools, execution services, data services, operating systems (OSes), and cloud services.Three mobile apps are Native Mobile AppsHybrid Mobile AppsWeb AppsReact Native is the most used cross-platform mobile app development framework.

To learn more about Mobile apps refer to:

https://brainly.com/question/20366434

#SPJ

Choose the comparison operator that will create a true statement in scratch

Answers

Answer:

the first one

Explanation:

think about it. 60 equals 60! this is true!

Answer:

A is correct

Explanation:

i took this same test

How can we avoid falling victim to a phishing or pharming scheme

Answers

Answer:

First of all, to avoid phishing check the URL box in your browser, and check the original destination if there are typos in the URL high chance of a phishing attack. Also in the website check out for typos and check for any suspicious activity in the website.

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps.

How should you implement this without storing the customers' credentials on the BuyMe server?

a. Use RADIUS authentication
b. Use Using Kerberos authentication
c. Use TACACS+
d. Use SAML

Answers

Answer:

Use TACACS+. IT IS THE BEST

Explanation:

IT IS THE BEST

Answer: Use SAML

Explanation:

What is the importance of size in graphic design?​

Answers

In design, size can function, size can attract or size can organize. When you are designing a piece, size plays an important role in making a layout functional, attractive and organized.


have a great day:)

BRAINLIEST!!!!!!!!!!!!!!

Which of the following options in Backstage View should be selected if you want to open a new, blank document?

○ Share
○ Open
○ Export
○ New​

Answers

Answer:

New

Explanation:

open just makes you open the last project you were working on, new makes a brand new one.

When you wish to start afresh with a blank document, select new choices in Backstage Views.

Backstage View:

Opening simply opens the last project you were operating on, whereas new creates a whole new one.

This backstage view aids in the creation of new documents, as well as the saving, viewing, printing, and publishing of existing ones.

If you already have a document open, a window will pop up with data on the file, as shown below.

Therefore, the final answer is "New".

Find out more information about the View here:

brainly.com/question/14934880


What important role is being described?
Completes the Action Item form.

Answers

Answer:

A sponsor is a member of congress who is willing to introduce and back the legislation. Explanation:

Please please help I don’t understand this

Answers

Answer:yes because ye and yes

Explanation:

Yes because yss

Answer:

Yes and yes

Explanation:

It is this because yes

What is computer software?​

Answers

Answer:

Software is a collection of instructions and data that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.

Explanation:

HOPE IT HELP

Answer:

software is the collection of programs which makes computer work.

PERGUNTA 1
Um pesquisador deve escolher o seu método de pesquisa:
a. Pelas facilidades em realizar a pesquisa.
b. Pelas experiências de outros pesquisadores.
c. Pelas especificidades do objeto de pesquisa.
d. Pelas regras dos manuais de pesquisa.
e. Por aquilo que for determinado pela instituição a qual está vinculado.

Answers

Answer:

c. Pelas especificidades do objeto de pesquisa.

Explanation:

É o que eu acho e quem achar diferente ta errado

Which of the following job duties would a software developer perform?
A. developing a product that is easy to use and meets a customer’s need
B. establishing security procedures to protect important information
C. managing and securing data
D. writing the code to make a new application work

Answers

Answer:

Either B or D but I think mostly B cause it makes more sense

Answer:

A. developing a product that is easy to use and meets a customer’s need

Explanation:

lnao its easy

definitely not b or d

When people become more dependent on digital technology in their lives, the potential for data misuse will grow. Explain the above sentence in your opinion.




**Answer and I will give you brainiliest**​

Answers

Answer:

yest that's correct.

Explanation:

for example we can see Artificial intelligence/AI the more it becomes super computer the future of human existence will be in jeopardy like in the movie Terminator.

some people will become lazy and don't use their brain for anything

Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth of the test. Calculate the percentage mark the student received. Print the student's name and percentage the student received.​

Answers

Pseudocode algorithms are used as prototypes of an actual program.

The required pseudocode algorithm is as follows:

Startinput name, score, test_worthpercent_score = score/test_worth * 100print name, percent_scoreStop

The first line begins the pseudocode algorithm

Start

The second line gets input for the student's name, score and the worth of the test

input name, score, test_worth

The third line calculates the percentage score

percent_score = score/test_worth * 100

The next line prints the student's name and the percentage score

print name, percent_score

The last line ends the pseudocode

Stop

Read more about pseudocode algorithms at:

https://brainly.com/question/21172316

What function in the secrets module can generate random integers between one and 30, including the possibility of both one and 30.

secrets.random(30)


secrets.randbelow(31)


secrets.randbelow(30)

secrets.random(30)

Answers

Answer:

secrets.randbelow(31)

Explanation:

This is Python Language, and secrets is an external module. So, to use it you need to install it using pip, just type pip install secrets in any terminal. And secrets module will be installed. If you will use the 1st or last code it will give give you error, because secrets module does not have any attribute named random. If you will use the 3rd code it will print random number from 0 to 29 only. If you also want to print 30, you need to you need to write the code given below:

import secrets

secrets.randbelow(31)

Describe about abacus​

Answers

An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.

Answer:

An abacus is a calculation tool used by sliding counters along rods or grooves, used to perform mathematical functions. In addition to calculating the basic functions of addition, subtraction, multiplication and division, the abacus can calculate roots up to the cubic degree.

Mikayla is listening to music while she completes research for a school assignment. The input and output devices are able to communicate with each other because the computer has

central processing memory
a central processing unit
random access memory
read-only memory

Answers

Answer:

A central processing unit (CPU)

public class Exercise_07 { public static void main(String[] args) { System.out.println(bin2Dec("1100100")); // Purposely throwing an exception... System.out.println(bin2Dec("lafkja")); } public static int bin2Dec(String binary) throws NumberFormatException { if (!isBinary(binary)) { throw new NumberFormatException(binary + " is not a binary number."); } int power = 0; int decimal = 0; for (int i = binary.length() - 1; i >= 0; i--) { if (binary.charAt(i) == '1') { decimal += Math.pow(2, power); } power++; } return decimal; } public static boolean isBinary(String binary) { for (char ch : binary.toCharArray()) { if (ch != '1' && ch != '0') return false; } return true; } }

Answers

Answer:

mhm

Explanation:mhm

what does any of this mean?

what is HDLC flow control?​

Answers

HDLC is a synchronous Data Link layer bit-oriented protocol developed by the International Organization for Standardization (ISO).
Other Questions
Question 1 of 10Fill in the blank in the following sentence with the appropriate stressedpronoun below.ils sont plus grands que toi.A. EuxB. LuiC. ToiD. Moi How many more grams of fat does the median ice cream serving have than the median chocolate serving? Subraya las palabras que estn divididas en slabas de manera correcta.bi - ci-cle - taauto - pis - tai-ti-ne-ra-se - na - la-mien-tovueltama - pa-res - tric-ti-voes - ta - cio - nar-secro - quiscru - zardi-a-go-nalcarre - te -rapre-cau- ciorin-for-matser - vi- ciospreven-ti-VOci-clis - tastu- risti - coad: Clasificar palabras de acuerdo con elo de slabas que las formanLibro de texto oficial.pgina 3539 Scientists developed a device capable of lowering temperatures in order to slow molecular motion to almost a complete stop. Which of these temperatures is theoretically able to make this happen?0 K0C273 K273C Some plants in the desert, like cacti, have long roots and think stems to obtain and store water. What do we call these characteristics that increase a cactus's chance to survive in the desert?A) AdaptationsB) FossilsC) SpeciationD) Mutations The function D(t) defines a traveler's distance from home, in miles, as a function of time, in hours. Please help due today !!!! please help with question 4. BRAINLIEST TO CORRECT ANSWER!!! evaluate X in 6561=9x[tex]6561 = 9x [/tex] Where did the Nazi get there ideas about racial superiority and Jewish hatred? What was the significance of the Code of Napoleon?O It was the first European constitutional monarchy systemO It was adopted by all European countries within ten years of its creationO It established a series of rights and laws that did not rely on traditional religious and social customsO It was created after the death of Napoleon to honor his rule over France in the early 1800s Describe the importance of human resource for business growth Use the drop-down menus to match each description with the part of a report where it is located.named moons in the solar system: page number printed at the bottom of page 1: page number printed at the bottom of page 20: group of data titled Hawks in a report on species of migrating birds: report titled Technology in the Workplace: calculation printed beneath a group of data: date of a report printed at the top of pages 2100: 10 POINTS!!!!...Which quote from Rikki-Tikki-Tavi by Rudyard Kipling clearly states the source and uses punctuation correctly?Those who kill snakes get killed by snakes, said Chuchundra, more sorrowfully than ever. Those who kill snakes get killed by snakes, said Chuchundra, more sorrowfully than ever. Those who kill snakes get killed by snakes.Chuchundra commented anxiously that someone who kills a snake will likely be killed by another snake. How does the closure property relate to polynomials?Open answer question (please hurry) Question 1How was Adoph Korn abducted?hit over the head with a gunbeaten uptied up and dragged off Could someone give me the answer to this question i need help on this- i will give brainliest!! Brian is building a sandbox that is 6 feet wide, 3 feet long, and 15 feet high. How many cubic feet of sand with the box hold? weight of sheep,in pounds, at the Southdown sheep farm:what is the range of weights of the sheep?plz anwser asap I'm being timed