1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
6

Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.

Computers and Technology
2 answers:
Vadim26 [7]3 years ago
5 0
False. Those are not social networking sites, and they don't develop contracts.
sergejj [24]3 years ago
3 0

Answer:

False

Explanation:

You might be interested in
. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understo
aksik [14]

Answer:

Explanation:

The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.

class Dollar {

   int dollars;

   double coin;

   private Dollar(int dollar, int coin) {

       this.dollars = dollar;

       this.coin = Double.valueOf(coin) / 100;

   }

   

}

4 0
3 years ago
Generally considered to be the most important information security policies, what item below defines the actions a user may perf
tamaranim1 [39]

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.

3 0
3 years ago
What is the sub-domain/domain name used to locate Web sites?
emmainna [20.7K]
The [sub]domain name is part of the <span>Uniform Resource Locator (URL). URLs also have the protocol path, optionally a port number, filename and arguments too.</span>

More info than you want:

Syntax of a URL:

protocol://machineName.domain.name:port/path/to/fileName?arg1=something&arg2=somethingElse
6 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provi
bulgar [2K]

Answer:

PAN

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • You can type notes of what to cover when presenting the show in the______ pane.
    15·1 answer
  • Although a user directory is treated as a file, it is flagged to indicate to the file manager that this file is really a ____ wh
    9·1 answer
  • What's the screen that displays results from typing text, performing calculations, or running programs?
    11·1 answer
  • Executives of a company deal less with details of the operational activities and deal more with the higher meaningful aggregatio
    14·1 answer
  • Text box linking is for two or more text boxes in a document, when the text overflows from the first box. Which scenario is the
    9·2 answers
  • How to make a project using PID and thermacouple
    11·1 answer
  • Consider the following code segment.
    5·1 answer
  • What is the distance from the end of the pin to the center of the hole?
    15·1 answer
  • 19) If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!