1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
6

Employers will check you out on social media sites like Facebook, MySpace, and Twitter.

Computers and Technology
2 answers:
hodyreva [135]3 years ago
7 0

Answer:

a

Explanation:

on edge

Fynjy0 [20]3 years ago
6 0
A) true
Eg. if you call in sick an employer will check social media to see if you actually are sick.
You might be interested in
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash ca
weeeeeb [17]

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

5 0
3 years ago
(Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
Marizza181 [45]

Answer:

When Patricia checks her email use:

POP3

TCP

IP

When Patricia brows a website and log in to post a comment use:

HTTP

TCP

IP

LDAP

Explanation:

Email protocol

Patricia starts to check her email, the email application uses the protocol POP3.

The protocol TCP makes a connection with the server and transport the data.

Patricia receives her emails with the protocol IP on her computer.

Website protocol

Patricia started to surf and the protocol HTTP makes a connection with the internet.

The protocol TCP makes a connection with the server and transport the data.

With the protocol IP, she receives the website data.

With the protocol LDAP, Patricia makes a login to post the comment.

6 0
3 years ago
Which changes the natural world? <br> technology <br> science <br> prototypes <br> feedback
Gelneren [198K]
It would be technology,
5 0
3 years ago
Casual or informal group meetings are common. Here youcasually chat over tea, meet after work, or get together for purelysocial
SCORPION-xisa [38]

Answer: True

Explanation:

Yes, it is true that the informal or the casual meetings are very common and you can chat over tea with your friends and colleagues and meet with your childhood friends in purely social meeting. Informal meetings are basically planned for relaxation your mind and mood other than formal business meetings. It does not have any agenda like the formal business meetings.

3 0
3 years ago
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • Name some of the file extensions for images and provide more information about one or two of them.
    12·1 answer
  • Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho
    15·1 answer
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • .<br> 1. Press the _______ key to move to the next cell in a row.
    14·2 answers
  • Yolanda lost her left foot during her military service, but she has been issued a prosthetic that enables her to walk normally,
    13·1 answer
  • To rename a database object, press and hold or right-click the object in the navigation pane and then tap or click ____ on the s
    10·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • In the following shell scripting extract, the initial values of variables s, c and p are 0, 1, 1 respectively. What will be the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!