1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
15

Netflix suggestions ?

Computers and Technology
2 answers:
Crank3 years ago
6 0
Sci-Fi: Stranger Things
Sports: All American
Action; The 100
Comedy: The Good Place
Drama: Riverdale

Hope this helps
hjlf3 years ago
3 0

Answer:Lost in space

Explanation:It is a great space movie do not watch if your scared

You might be interested in
Whats the answer? true or false <br><br><br> I accidentally clicked false.
Anarel [89]

Answer:

false i think

Explanation:

6 0
3 years ago
Read 2 more answers
Which is an example of oversharing using GPS?
sergij07 [2.7K]
I believe it is D


Social media networks make it easy to help share what’s going on in your life. The problem is when the wrong people get hold of that information. Criminals are smart. They’re connected, and they know how to use the Internet to their advantage. Stalking a victim, getting to know their routines and the times they’re home (and when they’re not) is as easy as opening a web browser and checking an open account. This excellent infographic from Credit Sesame helps illustrate exactly how your social media info can be misused. Last week, Cult of Mac ran a story that went viral about an app called Girls Around Me which aggregated public profiles of women in an area. Everything from check-ins, status updates, profiles and photo albums were aggregated for app users to see. As a result of the article, Foursquare has since revoked the app’s API access, disabling many of the app’s features. Scary stuff. While the app is hopefully mothballed, it highlighted a lot of security risks that are associated with being on social media. The safest option is to simply not use social media. But I’ll be honest: I can’t imagine deleting my social profile. Luckily, you don’t have to. Being vigilant about safeguarding your profile – and being selective about what you share and who you share it with – can help reduce the risk of using social media.


If you need more info LMK. If this is incorrect please comment that it is, along with the correct answer so I can figure out my error, have a great day TPWK
7 0
3 years ago
Read 2 more answers
Boxes
inessss [21]

Answer:

A,B,D

Explanation:

Got 100 on the lesson.

5 0
3 years ago
________ is a command-line utility installed in the windows\system32 folder that displays information about your windows version
Ne4ueva [31]
Im pretty sure its SystemInfo...... 
6 0
3 years ago
Why should information technology NOT be taught in school?​
tatiyna

Explanation:

Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.

5 0
3 years ago
Other questions:
  • Match the following tasks with their appropriate timing.
    8·1 answer
  • Where do you go to create a workbook?​
    8·1 answer
  • Basic fortran c++ c# and java are all ____ languages
    11·1 answer
  • Please help due today please help me!!!!!
    15·1 answer
  • What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
    9·2 answers
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • ________ is a programming language invented by netscape used to control the objects on an html page and handle interactions with
    5·1 answer
  • A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
    14·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • In general, the outside _____ and sleeves of the isolation gown and outside front of the goggles, mask, respirator and face shie
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!