1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
13

What are the ethical implications of online social media after someone has died?

Computers and Technology
1 answer:
ZanzabumX [31]3 years ago
8 0
<span>Think about the things people might have wanted private, but after death they have no control.</span>
You might be interested in
Adam would like to reduce the size of an image that he inserted into a document. He selects the image and chooses the Crop optio
Dmitrij [34]

Answer:

it allows users to trim the edges of the image,making the image smaller.

Explanation:

Cropping refers to removing unwanted parts of a graphic hence can facilitate to reducing the size

3 0
3 years ago
Read 2 more answers
The readline method of bufferedreader returns _____ when end of file is reached.
Misha Larkins [42]

Answer:

null

Explanation:

it does not turn to null value. It returns ;

when it reaches the end of the file

6 0
1 year ago
Write: In a five-paragraph essay that is two to three pages in length, address the
brilliants [131]

Why are you asking other people to answer a question about something that's affected <u>you?</u>

4 0
3 years ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
2 years ago
Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
Mrac [35]

Answer:

Explanation:

The answer is ludonarrative.

Please mark me brainliest.

4 0
2 years ago
Other questions:
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • What is wrong with my code...
    9·1 answer
  • interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varch
    7·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
  • What is the output for this program?
    12·1 answer
  • Identify and explain five areas where computers are used to process <br> data
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!