1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
4 years ago
9

what social media application that affect our day to day activities, and how did it improve our skill

Computers and Technology
1 answer:
julsineya [31]4 years ago
5 0

Answer:

Instagram

it improved persons photoshop skills to put out better quality photos and videos and it can be an outlet for creative persons    

You might be interested in
Difference between Hard copy and Soft copy?​
otez555 [7]

Answer: a hard copy is a printed or physical copy of a document, while a soft copy is a virtual or online copy of the document that is stored on your hard drive or computer.

Explanation:

8 0
3 years ago
Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
yaroslaw [1]
Report the person through proper channels
7 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Why are salaried employees often excluded from overtime pay
lyudmila [28]

The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

<h3>Do salaried employees get paid overtime?</h3>

A salaried employee is one that gets paid due to different kinds of work. They can be paid overtime unless there is a reason that they do not meet the test for exempt status as stated in the  federal and state laws.

Note that they are not eligible if they are specifically exempted from any form of overtime by the provisions that were given in the California Labor Code or the Industrial Welfare Commission Wage Orders that is known to be regulating wages, hours as well as working time.

Hence, The reason why salaried employees often excluded from overtime pay because  if they are able to make a given amount or carry out a specific duties that are not recognized, they are said to be not eligible for overtime pay.

Learn more about overtime pay from

brainly.com/question/19022439

#SPJ1

5 0
2 years ago
Assume that a bool variable isquadrilateral has been declared , and that an int variable , numberofsides has been declared and i
masya89 [10]
You should state the language you're using in these types of questions; here's an example in C++.

bool isQuad;
int sides;
std::cout << "How many sides does the shape have?";
std::cin >> sides;
if (sides == 4)
isQuad = true;
else
isQuad = false;
7 0
3 years ago
Other questions:
  • Why is it important to save a print copy of electronic sources?
    6·1 answer
  • When saving a memo you created in Word, which one of the following extensions is automatically assigned to the document?
    13·1 answer
  • Anyone willing to help with Excel?!!
    15·1 answer
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I<br>please help need the correct answers to all
    6·1 answer
  • What does Tristan need to do to add a row at the<br> bottom of the table shown?
    6·1 answer
  • How do you convert a binary number into a decimal number?
    6·1 answer
  • Why would online learning make you lazy
    13·1 answer
  • Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot
    13·1 answer
  • QN, 3. Write the working principle of computer.<br>​
    8·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!