1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
13

What are three recommendations for reducing risk and improving the privacy of your personal information while using social media

?
Computers and Technology
1 answer:
viktelen [127]3 years ago
6 0

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

You might be interested in
The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdepen
cupoosta [38]

Answer:

cyberspace

Explanation:

It is the notional environment in which communication over computer networks occurs.

5 0
3 years ago
Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
erma4kov [3.2K]

Treasury bond − Diversified mutual fund - Stocks.

An investment is an asset or item that is purchased with the hope that it will generate income or will appreciate in value. All investments involve some degree of risk. In finance, risk refers to the degree of uncertainty or potential financial loss that could happen in an investment decision.

In general, as investment risks rise, investors seek higher returns to compensate themselves for taking such risks. Relying on personal resources has more risk than relying on public resources of producers.

Usually, a portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds would be considered to be the highest risk portfolio.

3 0
3 years ago
Task 7: The following is a quiz program that asks the us-
Leni [432]

Answer:

peread

Explanation:

7 0
3 years ago
Please Help Me!!! 40 Points!! Match the correct definition to each term
fgiga [73]

Answer:

is there anymore to this problem because I would like to help you out more mate.

6 0
3 years ago
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
Other questions:
  • Can i earn money at weegy.com ?
    10·1 answer
  • Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour
    10·1 answer
  • The second row of letters on the keyboard is called the______ row
    14·2 answers
  • How do you take a screenshot on an iPhone?
    8·2 answers
  • 18. Applying what formatting option to your Excel workbook will make it easier to read when printed out?
    9·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. The company's pr
    10·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • What are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, r
    8·1 answer
  • 1) What is Database? List its Uses.<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!