1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
11

If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di

gital identity?
Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
4 0
Have them post more positive outcomes and help them understand that what they post stays there forever
Alja [10]3 years ago
4 0

Answer:

tell them to restart their social medias and leave a good impact on people

Explanation:

You might be interested in
What considerations have to be kept in mind with JPEG
topjm [15]
JPEG is a file format for an image that will be compressed. Since it compressed the file size will be much smaller. That makes JPEG is one of the most used file types for images and was a default format for many application. But the drawback of compressing an image is that a portion of the data will lose and will cause the image quality dropped or produce a noise.
8 0
4 years ago
Where can the greatest depths be found in the ocean?
34kurt

The answer is C: In ocean trenches.

Since the deepest part of the ocean lies in the Mariana Trench.

I hope this answered your question! :D

7 0
3 years ago
What does Iamo mean? i keep on hearing it and idk what it means
k0ka [10]

Answer:

laughing my ars e off

Explanation:

AAAAAAAAHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH

6 0
3 years ago
Read 2 more answers
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a
Anna11 [10]

Answer: vulnerability

Explanation:

3 0
2 years ago
Ryan wants to connect his flash drive to the computer. Which port should he use?
vodka [1.7K]
A- the USB port
there should be more than one on the computer

8 0
4 years ago
Other questions:
  • one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or
    9·1 answer
  • Which similar computer network components connect multiple devices?
    6·1 answer
  • The * key on the number keypad is used for _____.
    5·2 answers
  • List 7 basic internal component found in a computer tower?
    11·2 answers
  • What are three metrics used to define consistent network application availability?
    5·1 answer
  • Self-disclosure is most likely to occur _____________.a.
    7·2 answers
  • Create an ArrayList of Employees (contain id and name) and add 3 Employees to the ArrayList to start. Next, you want to sort the
    14·1 answer
  • Interface elements include but are not limited to:
    8·1 answer
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Provide TWO reasons to explain why humans and animals need clean wat​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!