Answer:
in direct speech, we convey the message of the speaker in his own actual words without any change to another person.
Explanation:
False, when you make a graph you can make many changes to it. It doesn't matter what kind of graph or where you make the graph on most applications you have to the option to make it exactly how you want it or change it after you have created it.
Answer:
yes nitro hack is where they time your hacking skills
<span>A Pivot table is used to analyze and summarize your data without graphical support</span>
Answer: Geotagging was enabled on her smartphone
Explanation:
The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.
Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.
In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.