1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
12

1. What are you going to do if someone ask for your personal information online?​

Computers and Technology
2 answers:
Stells [14]3 years ago
7 0

Answer:

Ask them why they need such information.

Explanation:

If they can't give you a good reason, please don't share your personal info. ♥

horsena [70]3 years ago
6 0

Answer:

<em>If someone ask my personal information online i'll  trun off  my mobile data or wi-fi  and then i'll block the user's Id</em>

Explanation:

<h2>hope it is helpful to you</h2><h2 />
You might be interested in
Would you rather be rich and unknown or famous and poor
ollegr [7]

Answer:

rich g

Explanation:

5 0
3 years ago
explain in detail how such a company can improve the focus and relationship with customers, and what they will benefit from this
Reil [10]
Advertisement maybe
6 0
3 years ago
14. Blender® does not typically use pop-up boxes. (1 point)
ivolga24 [154]
Hey buddy 

so 14 it was be a long time but l think it is true 

15 is <span>the range of tools and functions associated with that activity</span>
5 0
3 years ago
Is OS X a mobile operateing system
hodyreva [135]
Hello Williamsdarlene,
After reading your question, the answer to this question is:
No, OS X is not a mobile operating system. It is for computers.

Hope this helps!
3 0
3 years ago
Read 2 more answers
What does an operating system do
3241004551 [841]

Answer: An operating system manages and runs all of the hardware and software installed onto the computer.

Explanation:

It performs basic tasks such as file, memory, and process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

7 0
1 year ago
Other questions:
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Illia is a network administrator at a company.which tasks is she responsible for
    9·1 answer
  • I'm 11, except my profile says I'm 15.
    15·1 answer
  • Are one of the greatest features of Photoshop that allow nondestructive editing of images.
    6·1 answer
  • What Word feature is seen below?
    10·1 answer
  • The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
    11·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • Because people can easily upload information and share online, they tend to:
    15·1 answer
  • Each of these is a step in cEach of these is a step in conflict resolution: Evaluate solutions suggested. Define the problem. De
    7·1 answer
  • Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!