1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
4 years ago
9

Which of the following is not true about managing your privacy settings? (select all that apply)

Computers and Technology
2 answers:
Evgesh-ka [11]4 years ago
4 0
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
ELEN [110]4 years ago
4 0
<h2>Answer:</h2>

The following is not true about managing your privacy settings

  • Colleges use social media profiles during admissions process
  • Employers screen job candidates based on social medias
<h2>Explanation:</h2>

Privacy settings are the settings that are kept private for some options such as the personal information, images and events. Privacy settings are only controlled by the owner of the account and no one else. In the options given above someone can easily find our location based on a photo that we post. But the information that Colleges use social media profiles during admissions process  is not true. And in the same way employers screen job candidates based on social medias  because employers do not have access to the personal information of anyone.



You might be interested in
What is the difference between auto fill and fill handle ?​
lidiya [134]

Answer:

  • Auto fill a software function that automatically completes data (like the data that has been entered previously) without the user needing to type it in full.

  • The Fill Handle is a feature in Excel that fills the data automatically with a specific pattern in your spreadsheet cell.

hope u liked the answer :)

7 0
3 years ago
In 2011 a program named Watson running on an IBM supercomputer
lora16 [44]

Answer:C)Defeated the two most successful human Jeopardy! champions in a three-game match.

Explanation:  Watson emerged from the IBM supercomputer made by Thomas Watson .It is made from the two main component analytical software and the artificial intelligence which made it a optimal for the question-answer feature.

Watson defeated Ken Jennings and Brad Rutter(earlier successful contestants) in the program named Jeopardy by answering questions correctly and quickly in 2011.Other options are incorrect because it did not worked as the software engineer,humane genome or won crossword puzzle.Thus the correct option is option (c).

8 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Which header will be the largest?<br><br> Hello<br><br> Hello<br><br> Hello<br><br> Hello
geniusboy [140]

Answer:  

Bye

bye

bye

bye

Explanation:

4 0
3 years ago
Read 2 more answers
Q1: Which of the following is an input peripheral device?
faltersainse [42]

Answer:

Mouse

Explanation:

Input devices allow users to input something in the computer. For example keyboard allows users to type on the computer, or mouse allows users to click.

On the other hand output devices allow computers to output data. For example speakers allow us to hear the outputs of a computer.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What information is required for a complete citation of a website source?
    8·2 answers
  • How do you increase the amount of data in a sampled Google Analytics report?
    8·1 answer
  • Assume:
    14·1 answer
  • George wants to edit the font of the title text in his presentation. Where can he find the option to edit it?
    6·2 answers
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • The minimum spanning tree of an undirected graph G exists if and only if G is connected. True or False?
    12·1 answer
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • MULTI SELECTION
    9·1 answer
  • Ask the user to input a word. Then, print the first letter, the last letter, and the length of the word on the same line with no
    6·1 answer
  • Please help I’m not trying to fail
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!