1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
12

What is the best thing to do if you only want your close friends to be able to see your posts?

Computers and Technology
2 answers:
igomit [66]3 years ago
4 0

Answer:

check privacy settings. There will be a filter i am pretty sure :)

Zolol [24]3 years ago
3 0
The answer is B (check your privacy settings) because almost all apps and websites have privacy settings that give you some options for who is allowed to see your posts.

Also, the other three answer choices don’t really respond to the question because they are not about who sees your posts, but what your posts are about.
You might be interested in
Given an int as the input, print all the factors of that number, one in each line. For example, if the input is 15 The output wi
trapecia [35]

Answer:

The program to calculate factor can be given as:

Program:

#include <stdio.h> //include header file

int main() //defining main function

{

   int a,i; //defining integer variable

   printf("Enter any number: "); //print message

   scanf("%d",&a); //input value from user end

   for(i=1;i<=a;i++) //loop for calculate factor values

   {

       if(a%i==0) //define condition for factor

       {

           printf("%d\n",i); //print values

       }

   }

   return 0;

}

Output:

Enter any number: 15

1

3

5

15

Explanation:

In the above C language program the header file is include that provide the use of basic function, in the next line the main method is defined, inside this method two integer variable "a and i" is defined in which variable a is used to take value from user end and variable i is used in loop and conditional statement.

  • In the next step, for loop is declare, that start from 1 and end with value of variable a, inside a loop, if block is used that checks (a%i==0), in this if variable i value modeler value equal to 0.  
  • The loop will use the print function that prints variable "i" element in a new line, which is the factor the values.  

4 0
2 years ago
Read 2 more answers
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
umka2103 [35]
Templates I think. not sure
3 0
3 years ago
What are the top and side margins for a letter typed in standard format?
ella [17]
They should be between 1 and 1/4 inches
8 0
3 years ago
Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
Vikki [24]

A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

<h3>What is Enriching Your Data?</h3>

Data enrichment is known to be a kind of an augmentation and it is seen as the act or the process of making better an existing information by the use of a  supplementing missing or any kind of incomplete data.

<h3> What is a Lookup?</h3>

Data Lookup is known to be the method used to make plenty any information based on rules.

Hence, A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

Learn more about SPLUNK from

brainly.com/question/26470051

#SPJ1

8 0
2 years ago
Cyber security class i need help​
makkiz [27]

Answer:

Explanation:

yooooo it b

5 0
2 years ago
Other questions:
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • What is the function of the modem?
    12·2 answers
  • How do you uninstall sc update?
    13·2 answers
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • Which network component is used to connect one network to another? Which component delivers the message to the destination compu
    5·1 answer
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Which of the following is an example of group dynamics?
    8·1 answer
  • The ________ approach to motivation suggests a connection between internal physical states and outward behavior. achievement dri
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!