1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
10

Scott does not use privacy settings on his social media

Computers and Technology
2 answers:
likoan [24]3 years ago
7 0

Answer:

ARREST HIM!!!

Explanation:

Alborosie3 years ago
6 0

Answer:

Explanation

arrest him

You might be interested in
Which service uses a broadband connection?
Sidana [21]

Answer:

d

Explanation:

because all in one question form

5 0
3 years ago
Let's say you wanted to make an American Football game. What is an example of a legal issue you'd have to watch out for?
IgorC [24]

Answer:

Personal injury.

Explanation:

With a bunch of people running around on a field with a goal of <em>slamming into each other</em>, bodily injury becomes a relevant liability.

7 0
1 year ago
What is the best data type for traveling day?
kykrilka [37]
Here if its wrong sorry

7 0
2 years ago
What is machine level language ?​
NeX [460]

Answer:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1.

5 0
2 years ago
A que generacion pertenecen los gadgets?
alukav5142 [94]

Answer:

English please

Explanation:

8 0
2 years ago
Other questions:
  • What should you keep in mind when installing hard drives?
    5·1 answer
  • Why is it a good idea to view your HTML code in more than one web browser
    13·1 answer
  • If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
    13·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • - Consider the relation R = {A, B, C, D, E, F, G, H, I, J} and the set of functional dependencies F = { {B, C} -&gt; {D}, {B} -&
    14·1 answer
  • How to deactivate the brainly account?​
    13·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Each drop-down menu.
    8·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!