1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
8

Plz help!! ASAP!! And thank you!!

Computers and Technology
2 answers:
slega [8]3 years ago
4 0

Answer:

first one, become vulnerable to online harassment

Paha777 [63]3 years ago
3 0
It may be the first one because the other person said so
You might be interested in
Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?
Xelga [282]

Put a code or security system on or a very secure password

Hope this helps...

6 0
3 years ago
Read 2 more answers
Antivirus software products require that you update _____ on a regular basis.
Inga [223]

The Correct Answer is

Virus Definitions

Please Like

7 0
3 years ago
You created an outline within a worksheet. what does the button indicate to the left of a row heading?
cricket20 [7]
<span>Business Name (default field), State (correct field)</span>
3 0
3 years ago
An alternative to increasing the column widths and row heights is to ____ to fit the current width of the column
cupoosta [38]
It seems that you have missed the given options for this statement, but anyway, here is the correct answer. An alternative to increasing the column widths and row heights is to SHRINK THE CHARACTERS IN THE CELL to fit the <span> current width of the column. Hope this answer helps. </span>
4 0
3 years ago
1 MB equals to how many GBs? Or 1 GB = how many MBs? i want to know how many MBs equal a GB, or how many GBs equal a MB; i'm get
Deffense [45]
Approximately 1,000 MBs are in a gigabyte
5 0
3 years ago
Other questions:
  • Why did LISD had to block the game “among us”?
    8·2 answers
  • What isthe concept of packets, give example?
    9·1 answer
  • What type of engineer is needed in the following scenario?
    7·2 answers
  • Which of the following is not a method of data management?
    15·1 answer
  • The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
    12·1 answer
  • What is the difference between a Network Diagram and a Wiring Semantic?
    5·1 answer
  • . Why use a sensitivity analysis?
    14·1 answer
  • List out two ways to execute the script.​
    12·2 answers
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
  • Write code to define a function named mymath. The function has three arguments in the following order: Boolean, Integer, and Int
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!