1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
3 years ago
10

Describe at least two ways social media has impacted cybersecurity.

Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

You might be interested in
What is networking and types of networking?​
ANEK [815]

Answer:networking is searching the internet for information

there are different types of networking scanning the internet for info or reading a website

Explanation:

8 0
3 years ago
Your friend decides to create a spreadsheet containing vocabulary terms and their definitions to help prepare for the unit test
Nataly_w [17]

Answer:

The answer is SORT

Explanation:

Just did the test :)

6 0
3 years ago
____ variables are variables that are shared by every instantiation of a class. local instance
Colt1911 [192]

These are known as class variables, so called because of the property mentioned.

4 0
3 years ago
Directions: Identify the measuring devices and write its functions.
FrozenT [24]

Answer:

1.weigher - to weigh meat

2.

3. scissor - to cut things

4. tongs

5.measuring cups - to measure dry ingredients like flour

6 temperature - measures temperature

7 measuring spoons

5 0
3 years ago
Question 12 There are ____ octets in an IP address.
Marta_Voda [28]
The standard IP convention used in today's network is IPv4. Taking for example one basic IP address we have 192.168.1.1 - The ff IP has 4 octets. An octet is a group of 8 bits on the sample, we have 4 Octets making up 32 a standard 32 bit address.
6 0
4 years ago
Other questions:
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • When using ntfs as a file system, what can be used to control the amount of hard disk space each user on the machine can have as
    8·1 answer
  • A communications medium that carries a large amount of data at a fast speed is called
    14·1 answer
  • True or False: In Google Cloud IAM: if a policy applied at the project level gives you Owner permissions, your access to an indi
    8·1 answer
  • What is the benefit of making an archive folder visible in the Outlook folder list?
    6·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    11·1 answer
  • Which of these describes a database? Check all of the boxes that apply.
    15·1 answer
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    11·1 answer
  • Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of__________e-commerce transactions.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!