1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
11

In a social networking site your personal information is listed under your inbox. home. status. profile.

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
3 0
Profile let's go with profile hope this helps
You might be interested in
Which tag denotes the end of an element in HTML? A. / B. * C. > D. ) E. _
Lilit [14]

C. ">" denotes the end of an element. For instance <b>Hello!</b> or <hr />

6 0
3 years ago
What are common tasks Human Services workers perform? Check all that apply.
Ainat [17]

Answer: B, D, E, F

Explanation:

I got I right.

7 0
3 years ago
Read 2 more answers
What country is associated with the tor relay using the ip address 104. 244. 74. 97?.
Lelu [443]

Answer:

104.28.63.45 is an IP address located in Santos, Sao Paulo.

Explanation:

3 0
2 years ago
The answer to this question
kvv77 [185]

E is the correct answer.

Risk is present, always. Risk can be good or bad. There is a risk you could win the lottery.

Furthermore, how we perceive risk is different than what risk is actually there.

Risk can be shared amongst members of a group or company and the amount of risk can be altered or ameliorated.

Risk can always be managed.

E is the correct answer.

6 0
3 years ago
Read 2 more answers
How are some businesses capitalizing on social media at the time of someones death
stiv31 [10]
They'll post condolences messages etc which means many people will discover their business if they are looking for posts mentioning the deceased's name on social media. 
7 0
3 years ago
Other questions:
  • Software obtained illegally is called open-source software. true / false
    15·1 answer
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • What command in windows re gives you the opportunity to manage partitions and volumes installed on the system?
    7·1 answer
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • Which category does this fall in identity theft​
    6·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • Which term describes the process of training a machine to do simple, repetitive tasks, and adapt or correct its performance base
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!