1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
15

Jana keeps receiving friend requests from strangers on a social media site. This is making her uncomfortable.

Computers and Technology
2 answers:
Hoochie [10]3 years ago
7 0

Answer:

She should talk about it with a trusted adult.

Explanation:

valentina_108 [34]3 years ago
3 0

Answer:

She should talk about it with a trusted adult.

Explanation:

Social media sites are great but they can be used by evil people to help them to commit crimes. So, if you are a minor and strangers try to contact you, ask you for personal information, videos or photos; it's recommended that talk about it with a trusted adult before accept stranger's requests.

You might be interested in
What does a linear bus topology used to connect all network devices?
pentagon [3]
<span>A linear bus topology uses a common background cable to connect all network devices.</span>
5 0
3 years ago
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
3 years ago
NEED HELP 100 POINTS FOR ANSWER AND BRAINIEST!!! Which comparison operator is used to signify that a value is not equal to anoth
katrin2010 [14]

Answer:

We use SQL Not Equal comparison operator (<>) to compare two expressions. For example, 10<>11 comparison operation uses SQL Not Equal operator (<>) between two expressions 10 and 11

Explanation:

8 0
3 years ago
Read 2 more answers
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the
Katyanochek1 [597]

Answer:

SHA-1 is used in this case.

Explanation:

7 0
3 years ago
Other questions:
  • Clicking the _____ box completes an entry. cancel formula enter tab
    15·1 answer
  • Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
    12·1 answer
  • What is the difference between a fragment shader and vertex shader? How do they relate?
    8·1 answer
  • To rename a database object, press and hold or right-click the object in the navigation pane and then tap or click ____ on the s
    10·1 answer
  • A ______ is an exact duplication of the hard drive, including data files, system files, and settings, application files, and the
    15·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • Program ____ use graphical symbols and relational operators (such as &lt; for "less than" and = for "equal to") to portray the s
    8·1 answer
  • A circle surrounding the earth at the equator would consist of ___________ “degrees” of angular measurement.
    15·1 answer
  • What kind of skill is persuasion?
    7·1 answer
  • Write at least 4 sentences
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!