1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
4 years ago
6

Do most facebook and twitter users access the platform from their personal computers?

Computers and Technology
2 answers:
vlabodo [156]4 years ago
8 0
No???? Yes. Maybe. I don't know. Why is this relevant? <span />
astra-53 [7]4 years ago
7 0
NO, because phone is more popular in the charts for a pc that is not so popular mostly used by Gamers
You might be interested in
Which resource helps a user access a cloud service?
Gala2k [10]
The answer is computer networking.
6 0
3 years ago
Read 2 more answers
A___ is a placeholder where you can enter text to manipulate and give new graphical effects.​
Evgesh-ka [11]

Answer:

A "text box" is a placeholder where you can enter text to manipulate and give new graphical effects

7 0
3 years ago
Será que me podrían ayudar pasandome los códigos por favor
docker41 [41]

help me by passing the google codes to me for the following reasons

Explanation:

Somebody trying to set up Google Voice accidentally entered in your phone number, or, more likely, some scammer is trying to trick you into verifying your number for their Google account, so they can acquire another GV number for nefarious purposes, like robocalling or harassment.

The scammer is, in reality, going through the Google Voice setup process. The tell Google Voice to call or to text your personal number and it gives you the code, along with a warning to not share the code with anyone. Somehow, you ignore that explicit warning and give the scammer the code number.

Go to https://voice.google.com and select a Google Voice number. You can search by city or area code and then choose one from the list. Press the Verify button to verify your phone number. You will be prompted to enter a number to link, add your stolen phone number and hit "SEND CODE".

Criminals can steal your phone number by pretending to be you, and then moving your number to another phone. They'll then receive security codes sent via SMS on their phone, helping them gain access to your bank account and other secure services.

When you set up a Google Account, you can let Google know your phone's number. If you do, we'll verify that the number is yours. For your security, we'll re-verify from time to time to make sure that your phone's number is still yours.

Turn off 2-Step Verification

  • Open your Google Account.
  • In the "Security" section, select 2-Step Verification. You might need to sign in.
  • Select Turn off.
  • A pop-up window will appear to confirm that you want to turn off 2-Step Verification. Select Turn off.

Change how you get verification codes

  • On your Android phone or tablet, open your device's Settings app Google. Google Account.
  • At the top, tap Security.
  • Under "Signing in to Google," tap 2-Step Verification.
  • Under "Voice or text message," next to a phone number, tap Edit .
  • At the bottom, tap Change Phone.
  • Follow the steps on the screen.

5 0
3 years ago
________ was one of the first uses of the Internet
NeTakaya

Government weapon in cold war

3 0
3 years ago
Read 2 more answers
If you have two pennies, the probability of both coming up heads when flipped
aleksandrvk [35]
50% is the answer to your question
5 0
3 years ago
Read 2 more answers
Other questions:
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • In Online Data Extraction data is extracteddirectly from the ------ system itself.o Hosto Destinationo Sourceo Terminal
    15·1 answer
  • A printer is displaying no images on its LED panel. What can a technician do to troubleshoot the situation? Choose two answers.
    6·1 answer
  • Google's Chrome OS integrates with web servers using cloud computing and storage to run applications and to perform other functi
    10·1 answer
  • Select the correct answer.
    9·2 answers
  • The term _____________ refers to software license agreements that are included within a box of physical-media software.
    9·1 answer
  • Choose the words that make the following sentence true.<br> Primary memory is
    5·1 answer
  • Is it true or false 1-5
    13·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
  • We're given the training set data with the following values for variable X1:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!