1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
10

Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not

?
Computers and Technology
1 answer:
GuDViN [60]3 years ago
4 0
It makes me a little uneasy at times, yes, but I know that they cannot find me unless I share way too much.
Hope this helps~!
~{Oh Mrs. Believer}
You might be interested in
(EASY)
AnnyKZ [126]
If you go to a college website you will see the it has .edu in the URL extensions.
3 0
2 years ago
Read 2 more answers
A blue line, called a ____ line, that appears when you are dragging a GUI object on a Windows Form object indicates that the obj
ser-zykov [4K]

Answer:

snap

Explanation:

The line which appears when we are dragging an object of GUI on a object of  windows Form indicates that the object that is being dragged is aligned horizontally with the object which is connected by the blue line is called a snap line.

Hence we conclude that the answer to this question is snap line.

3 0
3 years ago
What action should you take when using removable media in a scif?
inysia [295]

Explanation:

What actions should you take when printing classified material within a Sensitive Compartmented Information Facility (SCIF)? Retrieve classified documents promptly from printers.

7 0
2 years ago
Information systems (is) users have no responsibility to follow security and backup procedures. group of answer choices true fal
Sauron [17]

The statement 'information systems (IS) users have no responsibility to follow security and backup procedures' is false.

Any kind of data that is available on the Internet has to be protected. All information users have the responsibility to follow the security procedures so that an unwanted circumstance does not arise. Hence, the statement above is false.

It is the responsibility of an organization to protect its data. For this reason, everyone, including the information systems (IS) users is entitled to follow security and backup procedures.

One should recognize that all these security and backup procedures are for our own security as data misplaced can be a loss to the whole organization. Security and backup procedures also help to keep data safe from hackers.

To learn more about information systems, click here:

brainly.com/question/25226643

#SPJ4

3 0
2 years ago
The image uses a school of fish to symbolize leadership.
timurjin [86]
Front is the answer because the fish is in red while the rest are in blue
5 0
3 years ago
Read 2 more answers
Other questions:
  • Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.
    5·2 answers
  • Using the mouse to move or copy cells is called ____.
    15·1 answer
  • Why did Simon bring Michael home?​
    9·2 answers
  • Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
    10·2 answers
  • End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page wit
    11·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • Let X and Y be two decision problems. Suppose we know that X reduces to Yin polynomial time. Which of the following statements a
    14·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·1 answer
  • a matched-pairs t-test is not an appropriate way to analyze data consisting of which of the following?
    11·1 answer
  • Part of an algorithm which is repeated for fixed number of times is classified as.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!