1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
4 years ago
6

True or false you have no control over who views your social network information

Computers and Technology
2 answers:
il63 [147K]4 years ago
4 0
  Your answer would be false. That's what you have security settings for.
trapecia [35]4 years ago
3 0
False you do yo can make it private
You might be interested in
What is the output?<br> answer = "Hi mom"<br> print(answer.lower())
xeze [42]

Answer:

hi mom

Explanation:

4 0
3 years ago
An IT professional with a customer-service
oksian1 [2.3K]

Answer: work late to make sure a persons issue is resolved

Explanation:

I just took the test

6 0
4 years ago
List ten features of word processing packages​
nydimaria [60]

Answer:

Entering text.

Editing text.

Formatting paragraph.

Formatting page style.

Importing text, graphics and images.

Entering mathematical symbols.

Checking spelling and grammar.

Header and footer and other.

6 0
2 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
Alex73 [517]
The mathematical operations/symbol/formulae can be inserted into MS powerpoint using equation editor. Just follow these steps:
1)click on the Insert
2) Select Object from the list
3) Select Equation Editor from the list and the dialog box of equation editor will open up. Now, write, edit your equation in this box. When you return back to powerpoint slide, the equation will come on the current slide, you are working on.
4 0
4 years ago
Read 2 more answers
Other questions:
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • The design activity key question, "how will this system interact with other systems..." is part of which design activity?​
    7·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • By using the internet, your company can obtain discounts thorugh...
    15·2 answers
  • To which of these options does the style in Word apply? Select three options.
    7·1 answer
  • Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
    10·1 answer
  • How to change your username in brainly​
    12·2 answers
  • If a person's mobile phone was designed to work with 4G technology, what will happen when a 5G network is rolled out in their ar
    14·1 answer
  • What feature is required to track customer search terms on a website?
    9·1 answer
  • Pick the correct statements on the 64-bit machine representation of numbers.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!