1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
12

True or false to join social network you create an avatar

Computers and Technology
2 answers:
frozen [14]3 years ago
3 0
The answer is FALSE.
The reason why it is false it is because not all social media websites provide avatars.
An Avatar is the manifestation,appearance or incarnation.In terms of social media in today's world your avatar is your identity.You choose to make your Avatar whatever you want it to be.It is what you project to others.Many people have different image online than in person.In social network it is a system that obliges virtual world symbols.
belka [17]3 years ago
3 0
<span>The answer is false. Avatar Social Network is a system that obliges virtual world symbols. It's been around for many years now. I initially made my record there in 2013 and afterward I blogged about it in 2014. As of late I've seen the site has had a touch of an overhaul and running easily so I figured it would be a decent time to advance it by and by. Likewise, a couple of my companions lost their facebook account again in light of their terms of administration so I figured this would be a decent option for those hoping to associate with other virtual world inhabitants.</span>
You might be interested in
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
4 years ago
Insert a formula that references the appropriate worksheets in cell a3 on the offensive totals worksheet to calculate total pass
Mnenie [13.5K]

In excel spreadsheets, you need to consider specifying relationships between the information you have stored in your spreadsheets when creating formulas. The elements that will help you understand using spreadsheet are the constants, operators, references and functions. This will enable you to use the formulas, without hassle in spreadsheets.

3 0
3 years ago
In order to print multiple worksheets, what needs to happen before printing?
ryzh [129]

Answer:

Explanation:

Click the File tab.

Click Print, or press the control p keyboard command.

On the Print screen, select the printer and other settings.

Click Print.

7 0
3 years ago
A batholith is an example of a(n) _____ igneous rock (one of the two main igneous rock groups).
Naily [24]
A batholith is an intrusive igneous rock.
3 0
4 years ago
Read 2 more answers
Import simplegui
victus00 [196]

Answer:

ooh....

Explanation:

For example, to convert from bar to pounds per square inch you would multiply by 100000 then divide by 6894.757. Or, multiply by 100000/6894.757 = 14.503774. So, to convert directly from bar to pounds per square inch, you multiply by 14.503774.

3 0
4 years ago
Other questions:
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • What Will Social Media Look Like in the Future?
    6·1 answer
  • When conducting research on the internet, what is a starting point for determining how to start the research?
    5·1 answer
  • Which are the benefits of leveraging web technologies?
    8·2 answers
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • What happens if the addressed device does not respond due to a malfunction during a read operation?
    11·1 answer
  • Which feature allows users to see all suggestions for edits to a document at once?
    7·2 answers
  • A task-oriented leader is ideal for a creative workplace.
    8·2 answers
  • An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data elemen
    7·1 answer
  • balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!