1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
5

What are the disadvantages of using social media to communicate with colleagues?

Computers and Technology
2 answers:
Vaselesa [24]3 years ago
8 0

Answer:

Barney is a dinosaur from our imagination

And when he's tall

He's what we call a dinosaur sensation

Barney's friends are big and small

They come from lots of places

After school they meet to play

And sing with happy faces

Barney shows us lots of things

Like how to play pretend

ABC's, and 123's

And how to be a friend

Barney comes to play with us

Whenever we may need him

Barney can be your friend too

If you just make-believe him!

Step-by-step explanation:

Explanation:

yanalaym [24]3 years ago
6 0

Answer:

The overall finding of the study is that this type of distraction can potentially decrease work performance and productivity, Increased Risk of Malware, Damaged Employee Productivity, Reduced Employee Relations, and Confidentiality and Company Image. Security. Using social media platforms on company networks opens the door to hacks, viruses and privacy breaches, Harassment, Negative exposure, Legal violations, Potential loss of productivity, and Wage and hour issues.

You might be interested in
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
The while loop has two important parts: an expression that is tested for a true or false value, and:
agasfer [191]

Answer:

The correct answer for the given question is option(A) i,e a statement or block that is repeated as long as the expression is true.

Explanation:

While loop is an entry control loop it means if the condition in while loop is true then the statement inside the while loop is executed untill condition of while loop is false .

Following are the syntax of while loop

while(condition checking)

{

// statement

// increment or dec variable;

}

Let us consider an example of while loop

Following are the program in c++

#include<iostream> // header file

using namespace std; //namespace

void main() // main method

{

int k=1; // variable declarartion

while(k<5) // iterating over loop

{

cout<<"hello brainly:";

k++; // increment of k by 1

}

}

In the following code the variable k is initialized by 1 so 1<5 condition is "true" it executed the statement  inside the loop that menas when k=1 it print hello brainly: after printed the message  hello brainly: it increment the value of k by 1, Now k becomes "2" again 2<5 condition is "true "it executed the statement again .This process will continue untill k=5 when k=5 the condition is "false" it terminate the while loop.

Output

hello brainly:hello brainly:hello brainly:hello brainly:hello brainly:

5 0
4 years ago
Write a class named Movie that has fields to hold the following data: Title Studio Name Year produced Rating In the Movie class,
rewona [7]

Answer:

Explanation:

don't know

3 0
2 years ago
"The network layer is responsible for transferring packets of data from the A.Source computer to the destination computer on adj
galben [10]

Answer:

Source computer to the destination computer via one of more networks

Explanation:

The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.

3 0
3 years ago
Calculate and express your answer in decimal form.
mr Goodwill [35]

Answer:

ポイントが欲しいだけなのかわからない

Explanation:

何語を話していますか

5 0
3 years ago
Other questions:
  • Common input devices include the keyboard, ____, and integrated video cameras.
    12·1 answer
  • Declare an array named scores of twenty-five elements of type int .
    7·1 answer
  • Which of the following can be used to visually represent information similar to diagrams?
    6·2 answers
  • Which would be the best reason to consider using plain tables instead of shaded tables in a document?
    6·2 answers
  • Which of these devices is usually the default for most home network?
    12·1 answer
  • The ____ of a variable is the location in memory where it’s value is stored. A. Value B. Address C. Data type D. Number
    8·1 answer
  • What is an example of a condition controlled loop? What would the syntax look like?
    14·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • If any one has mincraft on ps4 bedrock we can finish building a BIG city world all we need to put is a shop and money dispensers
    8·2 answers
  • [ASAP!] Which of these can be a problem for people with accessibility issues? Select 4 options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!