1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
9

Which of the following is not true about managing your privacy settings? (select all that apply)

Computers and Technology
2 answers:
Evgesh-ka [11]3 years ago
4 0
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
ELEN [110]3 years ago
4 0
<h2>Answer:</h2>

The following is not true about managing your privacy settings

  • Colleges use social media profiles during admissions process
  • Employers screen job candidates based on social medias
<h2>Explanation:</h2>

Privacy settings are the settings that are kept private for some options such as the personal information, images and events. Privacy settings are only controlled by the owner of the account and no one else. In the options given above someone can easily find our location based on a photo that we post. But the information that Colleges use social media profiles during admissions process  is not true. And in the same way employers screen job candidates based on social medias  because employers do not have access to the personal information of anyone.



You might be interested in
"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
Serggg [28]

Answer:

decision logic

Explanation:. The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works. These systems includes the following :

a) Order processing,

b)Pricing

c) Inventory control, and

d) Customer relationship management. And the traditional means of modifying the decision logic of information systems involves heavy interaction between business users and information technology (IT) analysts.

3 0
3 years ago
6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
ryzh [129]

Answer:

Explanation:

a) taking 00000005, it is a 13th bit which is 0, and therefore, we'd call it an ordered chunk

b) taking 00000005 again, it is 14th (B) and 15th (E) bits are 0 and so we'd call it a middle fragment

c) 00000015 is equal to 21, it is not a multiple of 4, and as such, it needs 3 padding bytes

d) 00000005 is equal to 5 making it a TSN. So the TSN is 5

e) taking 0003, we can then say the SI is 3

f) taking 000A, the SSN is then 10

g) the message is 48656C6C

6 0
2 years ago
________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
Arturiano [62]

Answer:

Behavioural targeting

Explanation:

Behavioural targeting is the method that enables advertisers to display more relevant ads based on user's search and browsing history. This is an online targeting technique that collects information from a particular user. This information comes from the person's browsing history. The information that comes from the browsing history enable advertisers to display specific targeted ads that would most appeal to the person in question.

7 0
3 years ago
Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
bonufazy [111]

The principles of creating equations are the same in PowerPoint 2007 and later. Assuming Danny is using PowerPoint 2010, he will click on the insert tab then go ahead and choose the Equation in the symbols group. 

Dani will be able to click on the equation option and use the Equation Tools Design tab or click on the drop down arrow to view more equations






3 0
2 years ago
All of the following are methods to improve the communication of your key messages EXCEPT:
uysha [10]

Answer:

Fill the slides with images and animations

Explanation:

these will most likely distract the audience

6 0
2 years ago
Read 2 more answers
Other questions:
  • A base class named Garden contains a private field width and a property public int Width that contains get and set accessors. A
    11·1 answer
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
    8·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • An electronic storage file where information is kept is called a cpu. true false
    11·1 answer
  • List all the steps used to search for 25 in the sequence given below. Use both (a) linear search and (b) binary search. 2, 7, 13
    7·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • How will understanding IT help me achieve my goals in life?
    14·1 answer
  • Computer system with a 32-bit logical address and 4k-byte page size. assume that each entry of a page table consists of 4bytes.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!