1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
14

Do you think privacy policies are effective in social networking sites?

Computers and Technology
1 answer:
Kamila [148]3 years ago
4 0

Answer:

When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.

You might be interested in
Cable Internet access can be described with which feature?
Alekssandra [29.7K]

Answer:

what issue do you think are important in our life

7 0
3 years ago
Read 2 more answers
What is the most effective way to demonstrate being prepared for an interview?
Arte-miy333 [17]

To prepare for an interview, find out as much as you can beforehand. Call the person who scheduled your interview and ask:

<span>Who will you be talking to? Will you meet the manager you'd work for, or will you just talk to HR? What are the interviewer's expectations?<span>What's the dress code? Dress better than suggested. Most times, it's best to wear a professional suit. You'd be amazed how many candidates show up looking like they're going to class, not presenting a professional demeanor.</span>Get directions to the office. Plan to leave early. Keep a phone number to call if you get stuck on the bus or in traffic. If you arrive late and stressed, the interview will not go well.If you don't have a detailed job description, ask for one.</span>

That's a five-minute phone call.

3 0
3 years ago
Program documentation _____.
otez555 [7]

Answer:

Option A is the correct option for the following question.

Explanation:

Because Program documentation is the documentation in which contain the information about the software and also contain the logic of the modules of the program is user-friendly and convenient language about that application or the software and it is hard copy or any digital manual through which the programmer has to know about the application.

So, that's why the following option is correct.

7 0
3 years ago
.In Python, comments begin with the comment marker and continue ______.
earnstyle [38]

Answer:

b. to the end of the line

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Python is a unique language compared to other languages such as Java and C++. In Python comments are started with the comment marker which is the hashtag (#) symbol and continues <u>to the end of the current line</u>. Once the line ends the next line is <u>NOT</u> automatically considered a comment unless another hashtag is placed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
How does voting help in a social news site?
Inessa05 [86]
It helps spread the word about certain candidates in an upcoming election.
6 0
3 years ago
Other questions:
  • A good reference point for determining the position of a line or curb in front of you is your __________ . A. Hood ornament B. L
    10·1 answer
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • The following 2D array has been created:
    12·2 answers
  • Which statement about creating folders is TRUE?
    15·2 answers
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • 19. Fatigue can help improve your reaction time.<br> False<br> O True
    8·2 answers
  • A network technician attempts to ping www.example.net from a customer computer, but the ping fails. access to mapped network dri
    5·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!