1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
10

In 2009 to 2010, 1 in 10 social network users:

Computers and Technology
1 answer:
a_sh-v [17]3 years ago
4 0

Answer:

C. dealt with online abuse

Explanation:

In 2009-2010, social networking was a new concept, and hackers were just starting to come into pictures. We don't have the smartphone as well then. And people were not so involved in it as well. No one hence thought of stricter security settings, and personal data was not that significant than either. Hence no one stole someone's identity either. However, people have begun to abuse online. And around 1 in 10 social networking users dealt with online abuse. Therefore this is the answer.

You might be interested in
What are computer crimes?​
Rom4ik [11]

Answer:

Hacking and exploiting

Explanation:

These are crimes

7 0
2 years ago
The "network of networks," consisting of LANs (Local Area Networksnetworks connecting two or more computers, usually within the
irina1246 [14]

Answer:

Internet

Explanation:

Internet is very often called the network of networks, creating a bridge between many networks and joining larger networks to another.

5 0
3 years ago
Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
Ksju [112]

Answer:

-He has a lot of experience.

Explanation:

Bill has little experience and Sam has a decade of on the job training. Therefore Sam is more experienced

8 0
3 years ago
Read 2 more answers
With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have othe
allsm [11]

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

5 0
2 years ago
Why are mobile apps often easier to develop than desktop apps?
Karo-lina-s [1.5K]

Answer:

Mobile app creation platforms are available that reduce the need to code.

Explanation:

Simple app creation softwares and tools are all over the place for mobile app creation. To create a mobile app, no coding knowledge or experience is needed unlike desktops apps that requires the knowledge of some coding languages like python, JavaScript etc.

The availability of these softwares and platforms have made mobile apps creation easy.

6 0
3 years ago
Other questions:
  • Write a program totake a depth (in kilometers) inside the earth as input data;compute
    15·1 answer
  • The rmdir command (with no options) can only remove empty directories <br> a. True <br> b. False
    14·1 answer
  • A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d
    11·1 answer
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • with the advent of technology one can experience special features such as 3D theater experiences true or false
    8·1 answer
  • Please answer fast..​
    15·1 answer
  • Content area a leased asset will appear on the balance sheet as a long-term asset. true false'
    5·1 answer
  • Question 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!