1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
4 years ago
9

How does social media affect our digital footprint? And What is your responsibility in others digital foot print? .Answer right

now for me to mark you as a brainlist( don't anything answer for free points)
Computers and Technology
1 answer:
dem82 [27]4 years ago
5 0

Answer: Social media nowadays can get us to do things we normally wouldnt do. The internet can tempt you to maybe click an ad that causes viruses or click a picture that looks interesting to you. Or even trolling someone online.  All of the examples can affect your digital footprint. Your responsibility in others digital footprint is to warn them to never give anyone you dont know your information. Or to never use websites that look fake or have bad review. Never fall for scams or websites that claim to give you free money or gifts. That way you and your friends have a digital footprint that isnt affected in a bad way.

You might be interested in
If I write too much for an exam answer, do I get downgraded?
Degger [83]

Answer:

I don't think so

Explanation:

4 0
3 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
4 years ago
The Caesar Cipher has 25 different shifts to try.
statuscvo [17]

Answer:

D. 25x24x23x22x21.....3x2x1.

Explanation:

The ceasar cipher is a encryption technique, that uses a combination of information or keys to encrypt an information.

The 25 shift ceasar cipher has 25 different combinations, so the number of probable random cipher substitution is 25!,

That is = 25 × 24×23× 22×..... ×2×1.

3 0
3 years ago
Which of the following describes a decision support system (DSS)?
levacccp [35]

Answer:

B.

Explanation:

8 0
3 years ago
Read 2 more answers
Which programming term describes the various characteristics of an object, such as its size and color?
SashulF [63]

Answer:

A

Explanation:

6 0
4 years ago
Other questions:
  • Which term describes the process by which light passes through an object or a medium.
    7·2 answers
  • Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter. Ex: sortArray = {10,
    8·1 answer
  • Which is said to be ‘computer on a chip’
    8·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • What effect does the interconnectedness of modern media have on society?
    14·2 answers
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • 1.Discuss why this class is important (or not) to a soon-to-be security practitioner. 2.Discuss one of more subjects you have le
    7·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
  • Please help I’ll give 10 points
    6·1 answer
  • WHATS 5X750 i really dont even know that questiob
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!