1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
6

To join a social network you create an avatar true or false

Computers and Technology
2 answers:
svp [43]3 years ago
7 0
False because not all social media webstites provide avatars
Fittoniya [83]3 years ago
6 0
It's false because you don't need to have avatar, on all websites. It would be bad user experience if you need to set avatar first.
You might be interested in
Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
mezya [45]

Answer:

d. integrity

Explanation:

Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.

4 0
4 years ago
Need some help thanks
sergeinik [125]

Answer:

1. There are many ways to write an algorithm. Some are very informal, some are quite formal and mathematical in nature, and some are quite graphical. The instructions for connecting a DVD player to a television are an algorithm. A mathematical formula such as πR2 is a special case of an algorithm. The form is not particularly important as long as it provides a good way to describe and check the logic of the plan.  The development of an algorithm, a plan is a key step in solving a problem. Once we have an algorithm, we can translate it into a computer program in some programming language. Our algorithm development process consists of five major steps.

2. computers only do what you told them to do, so If you wrote something wrong or you wasn't precise enough it might cause a massive damage and cause you to lose a lot of money.

3. You know when a problem should be solved whenever you need to make a decision that is important, or requires human intelligence and a computer doesn’t have human intelligence.

4. The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.

5. The brain uses chemicals to transmit information; the computer uses electricity. Even though electrical signals travel at high speeds in the nervous system, they travel even faster through the wires in a computer. Both transmit information. A computer uses switches that are either on or off ("binary").

5 0
3 years ago
Read 2 more answers
__________________ protects innovation.
kykrilka [37]

Answer:

Copyright.

Explanation:

Trademark is used to protect company names and logos, copyright is for inventions and programs etc.

7 0
3 years ago
Read 2 more answers
Several ways that we commonly use technology today that people couldn’t 10 years ago.
icang [17]

Explanation:

1. We cast our phones to our televisions so we can see our phone screen on the t.v. This is helpful to society as it exterminiates the need for extra, unnecessary wires connecting to the t.v.

2. We use technology to secure our homes. Many people have even exchanged a door key for a pad lock. This is helpful in the essence that we no longer need to worry about losing our keys, but it is harmful in that pad locks can be easily broken into as opposed to a house key which takes more time. For instance, there is an app where it shows you heat signatures in different colors depending on time. You can easily access a pad locked door by using this app.

3. We pay expenses through our phones (such as eChecks or Applepay) which is helpful in that it makes life easier and quicker, but harmful in that it allows easy access for hackers as well as identity theft. After all, it's not difficult for a hacker or even just an enemy of yours to decrypt a simple password or pin on your phone, especially when people leave their phones exposed in their back jean pockets and are constantly losing their phones in general.

6 0
3 years ago
What design feature of wep makes it a poor choice for wireless network security in larger wireless networks with hundreds or tho
nikklg [1K]
WEP provides no mechanism for automatically changing the shared secret.

Hope this helps :)
~Davinia.
4 0
3 years ago
Other questions:
  • Travis completes his assignments on a word processor. He wants to make sure that his documents are free from spelling or grammat
    9·2 answers
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • What does dram stand for?
    5·2 answers
  • To find the largest number in a list of numbers, use the _____.
    8·1 answer
  • Write an application that displays a series of at least five student ID numbers (that you have stored in an array) and asks the
    5·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    5·1 answer
  • For successful completion of an 8-Week course, how often should I visit the course web site to check for new e-mail and any inst
    14·1 answer
  • What is phishing?
    14·1 answer
  • Jared is a corporate trainer who creates presentations to deliver at workshops. When creating these
    8·1 answer
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!