subject
Social Studies, 23.01.2021 14:00 jasonoliva13

Article... New York Times ‘The Secret Social Media Lives Of Teenagers’ -by Ana Homayoun

1. What do homayoun and others discuss in the article claim about teenagers in the use of social media?
homayoun and other discussed in the article go about by saying that what teens do online can be punishable if the content being posted is deemed offensive or inappropriate. There are many dangers online that teenagers can face, and those dangers come with consequences. Another point that was discussed was teenagers addiction to social media and social media popularity.

2. How does the writer support those claims?

3. How does the writer rebut others argument about social media use?

4. Does the writer qualify any of the claims?

ansver
Answers: 2

Another question on Social Studies

question
Social Studies, 21.06.2019 15:30
The 2nd largest river in europe (that runs through 12 countries) is the river. question 13 options: rhine danube seine thames
Answers: 2
question
Social Studies, 22.06.2019 02:30
Telling your brain to slow down and focusing on details are crucial activities in which positive study habit?
Answers: 1
question
Social Studies, 22.06.2019 07:20
Based on your approved case, create fictitious digital evidence. you may use logs from your own computer (no personal information) as a guide or search the internet for samples. these samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference. document who, when, and how the evidence was obtained. remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. if necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation. digital evidence must meet each of the following criteria: some of your digital evidence must be retrieved by computer forensics. some of your digital evidence must be retrieved from log files. digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed. present digital copies of your evidence in text files, screen shots, or pdfs.
Answers: 3
question
Social Studies, 22.06.2019 18:00
What do you call places that belong to united states but arent states
Answers: 2
You know the right answer?
Article... New York Times ‘The Secret Social Media Lives Of Teenagers’ -by Ana Homayoun

Questions
question
Health, 19.07.2019 18:50
Questions on the website: 13722367