1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
7

If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image

Computers and Technology
1 answer:
notsponge [240]4 years ago
4 0
Won't you use a fake photo for your profile image or not put one on at all! This is a very safe way to keep your identity a secret and that you are very safe while you are online.

Hope this help!!
You might be interested in
Which of the following makes videos appear smoother and more fluid?
garik1379 [7]

Answer:

Higher frame rate

8 0
4 years ago
Read 2 more answers
Data is communicated through various input devices true or false​
kipiarov [429]
I would believe this is true if the following are also true.

Input devices are things like keyboards, mouses, buttons, e.c.t.

If that is true then I would believe it to be true due to multiple inputs are being used to communicate.
3 0
3 years ago
I need to figure out exactly how to make this figure while coding.
erastova [34]

Answer:

class Main {

 public static void main(String[] args) {

   System.out.println("   _");

   System.out.println(" /   \\");

   System.out.println("|     |");

   System.out.println(" \\ _ /");

 }

}

Explanation:

Backslashes have a special meaning in string literals. You have to escape them with a backslash, hence the double backslash.

7 0
4 years ago
Can any existing directory beneath the system root directory be used as a mount point?
musickatia [10]
<span>Yes.
   A mount point mounts a capacity gadget or filesystem, making it available and appending it to a current registry structure.
    While an umount point "unmounts" a mounted filesystem, illuminating the framework to finish any pending read or compose activities, and securely confining it.</span>
7 0
3 years ago
Which of the following is NOT contained on the Slide Show toolbar?
Lostsunrise [7]
B slide button is your answer
3 0
3 years ago
Other questions:
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • Show the contents of a queue after the following operations are performed. Assume the queue is initially empty. enqueue(45); enq
    6·1 answer
  • What the difference between a battery and power supply?
    15·1 answer
  • How do you adjust the shear of a shape?
    10·2 answers
  • What dod regulation governs the use of commercial wireless devices within the global information grid?
    13·1 answer
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”
    7·1 answer
  • A ____________________ machine is used to gather or arrange in their proper sequence.
    9·1 answer
  • Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
    12·1 answer
  • Why should you avoid the use of sarcasm, clichés, and idioms in business<br> letters
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!