1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
11

If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di

gital identity?
Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
4 0
Have them post more positive outcomes and help them understand that what they post stays there forever
Alja [10]3 years ago
4 0

Answer:

tell them to restart their social medias and leave a good impact on people

Explanation:

You might be interested in
Question 10 of 10
ValentinkaMS [17]

Answer:

C. Dow Jones

Explanation:

It’s the Dow Jones certainly, and we also know it as Dow 30. You will find with a little research that Dow Jones is an index of the 30 carefully chosen blue-chip stocks, and general industrial stocks. And this is price prejudiced average, and of 30 stocks that can be well-thought-out as an all-purpose measure for the whole stock market performance.

3 0
3 years ago
Electrical data suitable for transmission is called a(n)
Deffense [45]

Answer:

Signal

Explanation:

4 0
3 years ago
Craig's annual take-home pay is $75,000. What is the maximum amount that he can spend per month paying off credit cards and loan
kipiarov [429]

$ 75000 is the maximum amount that he can spend per month paying off credit cards and loans and not be in danger of credit overload.

More than this amount will exceed his income.

5 0
3 years ago
Read 2 more answers
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the
mojhsa [17]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • A drivers touches a cars steering wheel on a hot day which term refers to the way heat is transferredd to the drivers hand
    6·2 answers
  • Random-access memory (RAM) is able to quickly access data because it is arranged in which of the following configurations?
    8·2 answers
  • What are some useful properties of current electricity
    13·2 answers
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • Instagram
    9·1 answer
  • Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i
    10·2 answers
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • ANs and WANs can be set up in several different shapes, also known as peripherals.
    6·1 answer
  • Identify and explain 4 traditional (old ways) marketing approaches used by University uses in reaching
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!