1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
12

Why shouldn’t employers be allowed to look at everything their employee post online?

Computers and Technology
1 answer:
Bad White [126]3 years ago
8 0

People use social media in all types of ways. Many include posting their political or social views. If an employer was to check an employee's social media and see something that he or she didn't agree with and fired his or her employee over it, then the employer could get sued. Also, it protects privacy.


This is just an example of an explanation

You might be interested in
The process of providing only the essentials and hiding the details is known as _____. a. algorithm b. data structure c. abstrac
adoni [48]
The answer is (data) abstraction!
Hope it helped (:
3 0
3 years ago
Big data are used to _____. Select 3 options.
jeka57 [31]

Answer:

AI, Interests, and marketing

Explanation:

Processing privacy policies is not a real function of a large data set.

8 0
3 years ago
, , ,g d,t ,dt m,dt ymtd
maks197457 [2]

Answer:ummm me confused

Explanation:

4 0
3 years ago
What types of files we do backup in UNIX and Linux?
katrin [286]

Answer:

Nas ja kaki yawe diy. Kitu mu chuk k a jana a.

Explanation:

Karu explain pudi diya chal puter chuti kar.

8 0
3 years ago
Read 2 more answers
In cell E13, create a formula using the AVERAGE function
lukranit [14]
USE SOCRACTIC IT WOULD REALLY HELP WITH QUESTIONS LIKE THIS
3 0
3 years ago
Read 2 more answers
Other questions:
  • If you want to present slides to fellow students or co-workers, which productivity software should you use to create them?
    5·2 answers
  • Which name is given to an architectural framework for delivering ip multimedia services?
    8·1 answer
  • Why is it a mistake to put email addresses of people who don't know each other in the "To:" field?
    8·2 answers
  • Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
    12·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
    14·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • This is gonna be very long but I have no idea what to do, I'm confused.
    6·1 answer
  • Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
    7·1 answer
  • Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!