1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
10

What do the groups in professional networking sites allow you to do?

Computers and Technology
1 answer:
serg [7]3 years ago
5 0

is it that is focused solely on interactions and relationships of a business nature rather than including personal, nonbusiness interactions?

You might be interested in
Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
Serggg [28]

Answer: (D)DoS attack.

Explanation:

Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.

7 0
3 years ago
Which of the following are responsibilities of information security management? Defining the protection required for systems and
Talja [164]

Answer:

all of them are responsibilities

Explanation:

4 0
2 years ago
Greg is writing a report on becoming an advertising and promotions manager. Complete the report by correctly filling in the miss
zzz [600]

Since Greg wants to become an advertising and promotions manager, he needs to at least gain a (B) bachelor’s degree level of education, since generally, this educational background is expected from individuals who wishes to work in an entry-level position in the field of advertising.

One of the skills that he also needs to develop is (C) communication skills, because he would have to be able to communicate in both written and spoken to develop the advertisements according to the client’s desires.

8 0
3 years ago
The do-while loop is a __________ loop that is ideal in situations where you always want
belka [17]
your answers are all D
4 0
3 years ago
Select the correct answer.
ioda

Answer: D

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • What is PHP language
    12·1 answer
  • Charlie is taking his slide presentation to a meeting at a remote location. He saves his presentation as a package on a CD. Char
    15·2 answers
  • Why is an ISA unlikely to change between successive generations of microarchitectures
    11·1 answer
  • Is the jane austen pride and prejudie a primary source
    6·1 answer
  • Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N d
    8·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Help me!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!​
    9·1 answer
  • WILL MARK BRAINLIEST FOR ANYONES ANSWER!
    12·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!