1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
3 years ago
15

True or false you have no control over who views your social network information

Computers and Technology
1 answer:
cestrela7 [59]3 years ago
4 0
<span>This statement is false. Privacy is a very high-stakes concern for many social networks, who have gone to great lengths to put in place certain restrictions, such as the ability to make ones profile private or hide a profile from certain individuals.</span>
You might be interested in
Which of the following examples has four beats in each measure?
Gwar [14]

Answer:

A

Explanation:

8 0
3 years ago
Read 2 more answers
Give me 3 companies that utilize audio/video technology
mestny [16]

Answer: I think Harman International. Bose.

Sennheiser, that ultilize audio And Zendesk

New Relic That ultilize video technology.

Explanation:

3 0
3 years ago
Jamal wants to create a program that will play music during the afternoon. Which kind of loop should be used in the program?
Colt1911 [192]

Answer:

i could be completely wrong, but my guess is "while"

Explanation:

7 0
3 years ago
Read 2 more answers
How can a target network be flooded?
Blizzard [7]

Answer:

A targeted local disclosed ping flood targets a single computer on a local network. An attacker needs to have physical access to the computer in order to flood your network

Explanation:

7 0
3 years ago
If you have a floating layer in your project you will be unable to​
vlabodo [156]

Answer:

You will not be able to execute the file

Explanation:

A floating layer is a type on a layer or temporary layer which is similar in function to a normal layer. The floating layer is also known as the floating section. When working on a computer, this often appears as a warning with a diamond in yellow. This is followed by a command explaining why the program cannot be executed unless the layer is removed.

7 0
3 years ago
Other questions:
  • What exactly is a byte? A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one speci
    10·1 answer
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Which type of password would be considered secure?
    15·1 answer
  • The ash and dust from a volcanic eruption can cause a _______ change in the environment.
    13·1 answer
  • Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
    10·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • In two to four sentences, describe how you would center text.
    10·2 answers
  • What is not a benefit of exploring tabs and groups in Microsoft Word?
    9·2 answers
  • 2) The CPU is made from a silicon<br>b) Chip<br>C) pendrive<br>a) Steel<br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!