1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
14

How can you best protect yoursel and when using social media

Computers and Technology
2 answers:
ASHA 777 [7]3 years ago
8 0

Hey there!

"How can you best protect yourself and when using social media?"

Well, for protecting yourself

  • You can't tell random people (strangers you don't know) your personal information, like phone number, address, factual stuff about yourself (name)

For social media

  • Create a difficult password that YOU can remember
  • Don't  put personal information
  • Keep  your things on things PRIVATE

In other words , make sure you're contacted/ connected to/with  people you personally know and avoid strangers

Good luck on your assignment and enjoy your day!

~LoveYourselfFirst:)



maria [59]3 years ago
4 0

Make ur profile private, don't post ur real name, and don't post anything u think might expose u, no matter if its big nor small, appropriate or inappropriate (<---especially this one).

You might be interested in
Which for loop will iterate 100 times? Group of answer choices for (i = 0; i &lt; 99; i++) for (i = 1; i &lt; 99; i++) for (i =
cupoosta [38]

Answer:

for (i = 0; i < 100; i++);

Explanation:

8 0
3 years ago
Read 2 more answers
There are well-known classes of problems that are intractably difficult for computers, and other classes that are provably undec
Wittaler [7]
No. It is not impossible to understand and make this algorithm a success. It may only take a longer duration to reach success but it does not that it is impossible. Problems may become more difficult to understand and debug but there is enough time, duration, resources and support, the algorithm can be developed.
4 0
3 years ago
Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
-BARSIC- [3]

Answer:

Bob

Explanation:

we can use symbolic reasoning to prove that Bob is not innocent without enumerating all of the cases.

6 0
3 years ago
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to
ivann1987 [24]

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

6 0
3 years ago
Convert the following MIPS instruction to its binary and hex representations by doing the following: On first line, type registe
Firdavs [7]

Answer:

To make the group of four we can write 100011 as 00100011

Now, the two groups are:- 0010 and 0011

And 0010 in binary corresponds to 3 in Hexadecimal

And 0011 in binary corresponds to 4 in Hexadecimal.

So, 100011 of binary corresponds to 34 of hex.

3 0
4 years ago
Other questions:
  • Technology that is attached to a tag and used to identify postal packages is a(n) _____.
    12·2 answers
  • In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
    7·1 answer
  • What does the cpu do (in terms of register contents and stack) when it executes a jsr instruction?
    12·1 answer
  • Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to calculate her company's mar
    13·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • How many Pokemon have only one type? In other words, for how many Pokemon is Type2 blank?
    6·1 answer
  • Academic databases are the best place to look for
    12·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • The process of specifying that certain rows be displayed in the results of a query is known as selection. ______________________
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!