1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
12

Which of the following is NOT one of Facebook s main features? Private messages Posts from friends Status updates Web searching

Computers and Technology
1 answer:
laila [671]3 years ago
4 0
I think it is web searching.
You might be interested in
What is a credit card balance? A...The amount of interest you must pay the credit card company B...The required minimum payment
eimsori [14]
A because my sister told me and it was corecct
3 0
3 years ago
A high-angle shot is the same thing as a bird’s-eye shot. True False
mariarad [96]
I believe that is false, but note I could be wrong.
7 0
3 years ago
Read 2 more answers
Select all the correct answers.
krok68 [10]

Answer:

Higher resolutions in games

Smoother, faster playback

Explanation:

A graphics card is a piece of hardware installed on a computer that that is responsible for rendering the image on the computer's monitor or display screen. Graphics cards come in many varieties with varying features. The CPU will send any graphics related tasks directly to the GPU while it continues to process other tasks. Because graphics cards use a lot of power they need a cooling fan. The cooling fans are noisy so they make the computer sound louder than they were before the graphics card was installed.

7 0
2 years ago
Read 2 more answers
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
4 years ago
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
Other questions:
  • After several incidents in __________ the company’s computer systems were not ready to support new products, the CEO established
    12·1 answer
  • The issue with discovering a perfect solution to a problem is that ________.
    10·2 answers
  • In the source-code file containing a class's member function definitions, each member function definition must be tied to the cl
    13·1 answer
  • What happens if you move unencrypted files into an encrypted folder?
    5·1 answer
  • True/False: When you make a function call, the order of the arguments you send does not matter as long as the number of argument
    15·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • When a person or organization uses the services of another professional, that person or organization is called the _______
    15·1 answer
  • Due dates is the final date an assignment will be accepted. Plan ahead to ensure should you face difficulty with the assignment
    9·2 answers
  • Please i relly need this! ​
    11·1 answer
  • In this lab, you complete a C++ program that uses an array to store data for the village of Marengo.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!