1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
6

Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.

Computers and Technology
2 answers:
Vadim26 [7]3 years ago
5 0
False. Those are not social networking sites, and they don't develop contracts.
sergejj [24]3 years ago
3 0

Answer:

False

Explanation:

You might be interested in
tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
Marta_Voda [28]
The answer to this question is b that's the answer
5 0
3 years ago
My laptop is 20℅ charged and then i shut down it . I dont turned it on for 2 days and also donot charge it now after 2 days it i
Tju [1.3M]

Answer:

__you need to charge it__

4 0
3 years ago
What question for attack libraries help answer?
ch4aika [34]

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




6 0
4 years ago
Melissa is working on her Cell class by adding new methods. However, in her most recent version, she is receiving errors in some
ollegr [7]

Answer:

mfjkdjbchbnbjnjnnbbjbjvbfbgjbbbgbnbbcbbbnmbhnmbkggkjhjgghggfgfgghhjjhjhgfcghjiokijuyfdsfghuijopiuytrdfcgvhbjklp[oiu98y7t6rdfcvbnjklpo09876rdxfcvb nmlkoiu8y7trfdxcv bnjkloi9u87tyfgvbnm,lpoi98uygvbnm,loihuuuuuuuuuujhgftr5kjihugytfrdeujbhgytfrdfghuytfgvhuytfghuytgfgtgfghyt

Explanation:

8 0
3 years ago
1a) Skills are increasingly the key variable of the entire process of access and information inequality in the information socie
vodka [1.7K]

Answer:

Explanation:

Skill acquisition improves quality, competence and competitiveness of an individual, It boost the chances of success and ability to make an impact. Access to information plays a verybhuge role in the society as it enables hearers to get updated while those who aren't informed are left behind. Some of the key competences or skills required in the information society include:

Critical thinking : Problem identification and ways to solve them.

Information sourcing and gathering : knowing where to get vital informations and facts

Effective communication, creativity, leadership, social, media and technological skills and so on.

The skills could be can be applied on schools in the form of :

Creating clubs such as the writing and debate clubs where students are given a research topic to write and present, this improves their research ability and communication skill.

Group project or assignment improves collaboration between members.

Assignments or projects requiring technology : Students may be given problems to solve with the use of computers moutwr programs and technology, this will help mad improve productivity.

Reward for innovation: Students should be paused mad encouraged for being creative, this will improve such individual and push others as well.

4 0
4 years ago
Other questions:
  • Can someone please help me write a code for this
    7·1 answer
  • 4. What is the difference between portrait orientation and landscape orientation? (1.0 points)
    9·1 answer
  • In a game with three frames, where will the objects on Layer 1 appear?
    6·2 answers
  • 11 of the 25 people on the bus get off at the first stop. What percent best represents the portion of the bus that got off on th
    7·1 answer
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • Online databases allow you access to material you may not be able to find when using popular search engines like Google. Select
    10·1 answer
  • Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following ta
    12·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Photoshop files are generally small in size. True or false
    13·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!