1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
2 years ago
10

In 2009 to 2010, 1 in 10 social network users:

Computers and Technology
1 answer:
a_sh-v [17]2 years ago
4 0

Answer:

C. dealt with online abuse

Explanation:

In 2009-2010, social networking was a new concept, and hackers were just starting to come into pictures. We don't have the smartphone as well then. And people were not so involved in it as well. No one hence thought of stricter security settings, and personal data was not that significant than either. Hence no one stole someone's identity either. However, people have begun to abuse online. And around 1 in 10 social networking users dealt with online abuse. Therefore this is the answer.

You might be interested in
Along with an ip address, a subnet mask, and a name server, the other thing required for a computer to operate on a network is a
laiz [17]

Along with an IP address, a subnet mask, and a name server, the other thing required for a computer to operate on a network is a primary gateway. The primary gateway acts as an access point which forwards information to another network or the internet.

6 0
3 years ago
Does an android tablet have a hard drive
Kisachek [45]
No, it uses flash menory
3 0
3 years ago
Which is a safe Internet behavior?
Westkost [7]
Don’t give out personal information
7 0
3 years ago
Which tool is used to create a basic web page using HTML?
GuDViN [60]

Answer:

A text editor

Explanation:

A text editor is an application that enables a programmer edit and create codes in a programming language. These codes are then executed to do just what the programmer wanted them to do.

5 0
2 years ago
Read 2 more answers
Brian drives a car that uses voice commands for navigation. Which field did researchers use to develop a car-based AI that under
pickupchik [31]

Answer:

A, Computer Engineering

4 0
3 years ago
Other questions:
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • What is the benefit to displaying the merge codes in a document?
    9·1 answer
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • What is a computer network?
    5·1 answer
  • When adding cells you must use a "+" symbol, you cannot use a ":" symbol.<br><br> ☐ True<br> ☐ False
    13·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • (Please answer both parts, please)
    8·2 answers
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
  • You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!