1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
10

TRUE OR FALSE!!!!!

Computers and Technology
1 answer:
KatRina [158]3 years ago
6 0

Answer:

True

Explanation:

Using CCleaner, it's revealed that there are trackers within "secure" websites/apps such as Google and Tiktok. The manufacturer(s) of these websites/apps can share your information with whoever they're working with. Since people often look past the terms and conditions when installing an app and or program, they don't see that companies can easily retrieve all of your data within a couple clicks.

You might be interested in
I need help 50 points and brainiest if you answer
Troyanec [42]

Answer:

200

Explanation:

6 0
3 years ago
Read 2 more answers
How is IT related to new business initiatives?
wlad13 [49]

Answer:

Key Driver

Explanation:

Its undoubtedly the information that is most important for any new business initiatives. All these decisions are taken by Board of directors, and are being executed by the Chief Executive of the company.However, these are higher officials and are well educated to take decision from given refined information. The data need to be more clean for the Board of Directors as compared to the CEOs. The data must be more precise and more accurate for the higher authority, and like more precise for management as compared to the technical team. The reason is shortage of time.  Also what is information for technical team, is data for the management. And all this is made possible through IT, and subjects like Information Science, and various IT technologies.

7 0
3 years ago
How do we store value in a variable? Give an example
Komok [63]

Answer:

hi

Explanation:

im not smart

4 0
3 years ago
Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
Genrish500 [490]

Solution :

function tickets(user_tickets){

var num_tickets;

if (user_tickets < 5) {

num_tickets = 1;

return ('num_tickets: '+ num_tickets);

}

else {

num_tickets = user_tickets;

 return('num_tickets: '+ num_tickets);

}

}

// Testing the tickets function

// With user_tickets = 3, 5, 8, and 1

console.log(tickets(3));

console.log(tickets(5));

console.log(tickets(8));

console.log(tickets(1));

7 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
Other questions:
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • All of the following are aspects of the search process except?
    6·2 answers
  • Write a program that takes a decimal number from the user and then prints the integer part and the decimal part separately. For
    13·1 answer
  • Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creat
    13·1 answer
  • Is amazon a e-commerce website <br> o true <br> o false
    8·2 answers
  • Which area of government regulations do the Fair Credit and Reporting Act
    8·2 answers
  • What is the meaning of FTTH
    9·2 answers
  • What type of access controls allow the owner of a file to grant other users access to it using an access control list
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!