1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
9

Which of the following is not true about managing your privacy settings? (select all that apply)

Computers and Technology
2 answers:
Evgesh-ka [11]3 years ago
4 0
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
ELEN [110]3 years ago
4 0
<h2>Answer:</h2>

The following is not true about managing your privacy settings

  • Colleges use social media profiles during admissions process
  • Employers screen job candidates based on social medias
<h2>Explanation:</h2>

Privacy settings are the settings that are kept private for some options such as the personal information, images and events. Privacy settings are only controlled by the owner of the account and no one else. In the options given above someone can easily find our location based on a photo that we post. But the information that Colleges use social media profiles during admissions process  is not true. And in the same way employers screen job candidates based on social medias  because employers do not have access to the personal information of anyone.



You might be interested in
There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
GarryVolchara [31]

The potential risks that is linked with the use of internet as a resource point is known to be copyright infringement.

<h3>What is Copyright infringement?</h3>

This is known to be the creation of a book or any other resource material that has been copyrighted and protected without taking the granted permission of the copyright holder who is found to be the author of the work.

Note that The potential risks that is linked with the use of internet  resource point is known to be copyright infringement and one can be punish for it.

Learn more about copyright infringement from

brainly.com/question/14855154

#SPJ4

6 0
2 years ago
Please Help Fast!!!!!! Brainliest for First to answer!!! Conflict resolution is the process of solving disputes and disagreement
MaRussiya [10]
It's true............
8 0
3 years ago
Programming Project: N-Queens Prerequisites: Chapter 5 For this project you will create a class that solves a variation of the 8
Alex
Socractic Would Definitely Help With An Answer Like This
5 0
3 years ago
Distinguish between weighted codes and non weighted codes​
Gnom [1K]

Answer:

In weighted codes, each digit is a assigned a specific weight according to its position. NON- WEIGHTED CODE - The Non - Weighted Code are not positionally weighted. In other words, codes that are not assigned with any weight to each digit position. Hope it helpful U.

8 0
3 years ago
Develop an algorithm to compute and print out the average of 3 numbers A,B,C​
OLga [1]

Answer:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

Explanation:

We need to write an algorithm to compute and print out the average of 3 numbers A,B,C​

An algorithm has Input, Processing and Output

The algorithm required is:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

3 0
3 years ago
Other questions:
  • John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
    12·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Define a function below called average_strings. The function takes one argument: a list of strings. Complete the function so tha
    11·1 answer
  • Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
    6·1 answer
  • Meaning of ‘integrity of data’
    14·2 answers
  • Arrange the steps involved in natural language generation.
    9·1 answer
  • Assume that you are working with spreadsheets, word processing documents, presentation slides, images, and sound files for a sch
    15·1 answer
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
  • Identify different character components for a given typeface: Arial.
    13·1 answer
  • One benefit proprietary licensed software is that it
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!