1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
14

Jenna updated her status on a social network regarding her upcoming vacation. What information should Jenna not provide when upd

ating her status on a social networking site?
her favorite quote
her likes in popular culture
her routine
her opinions on social issues
Computers and Technology
2 answers:
Helen [10]3 years ago
7 0
Jenna should NOT provide her routine!!!
hope this helps and have a great day!!
irga5000 [103]3 years ago
7 0
Jenna wouldn't want to provide "Her Routine."


You might be interested in
2. It enables you to gather data on a specific topic. *a.Interviewb.Questionnairec.Surveyd.Research
Assoli18 [71]

Answer:

Explanation:

am pro

7 0
3 years ago
Based on the module,
svp [43]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

8 0
3 years ago
if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
galina1969 [7]

The NMap procedure that can be used to help you to gain information about remote *nix hosts is Script Scanning

<h3>What is script scanning?</h3>

The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Therefore, The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Learn more about Script Scanning from

brainly.com/question/18152781

#SPJ11

4 0
2 years ago
The leading membranophone in "Kan andi ghazal" is the ________. (If you can not access the audio file here, please go to modules
ICE Princess25 [194]

Answer:

Tabl Baladi

Explanation:

The Tabl Baladi is a large drum with wood frame and heavy skin on both sides. It is hung by a belt around the player's shoulder is and played with two sticks: the thick one is for the dum sound played with the dominant hand, and the thin stick is for the tak sound played with the other hand.

It is mostly used in classical Arab (Middle Eastern) music. Kan Andi Ghazal is a song by the Lebanese musician Wael Jassar.

5 0
4 years ago
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
katrin2010 [14]

Hey there!

I would say the answer to this question is <u>Movement</u>.

If you look at the principles of design the definition of Movement is <u>Movement is the path the viewer's eye takes through the work of art, often to focal areas.</u>

In Cathy's design, it states that when viewers view her website their eyes first fall on the brand name, and then they view the bright images on the page.

Based on the information given you can conclude that the design principle that Cathy used was <u>Movement</u>.

I hope this helps,

Have a great day!

<u></u>

4 0
3 years ago
Other questions:
  • The encapsulation unit on the data link layer of the osi model is _________
    10·1 answer
  • Please what's the answer to this
    14·1 answer
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
    10·1 answer
  • Which keys should you press to insert a comment in OpenOffice Writer?
    15·2 answers
  • How do I log into PGCPS?
    14·1 answer
  • You construct a simple electrical current to boil water for tea. A battery generates positive and negative charges. A wire conne
    13·1 answer
  • output device. Vrite very short answer of the following questions. What is computer hardware? Which dovico in lini nwhich device
    15·1 answer
  • Which coding manual contains three to seven character codes with a decimal after the third character
    11·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!