The pros for using social media include all of the following except _______ .

A. the possibility of becoming addicted
B. the low cost of reaching a wide audience
C. easy communication with users
D. immediate communication


Answer: A

Computer Science & Information Technology

You might also like to view...

static member functions:

a. Can use the this pointer. b. Can access only other static member functions and static data members. c. Cannot be called until an object of their class is instantiated. d. Can be declared const as well.

Computer Science & Information Technology

Hackers are just one of many _______________ a network administrator must be prepared for.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is an example of "something you possess"?

What will be an ideal response?

Computer Science & Information Technology

ControlLogix modular Ethernet communication module comes from the factory configured as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology