1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
14

Do you think privacy policies are effective in social networking sites?

Computers and Technology
1 answer:
Kamila [148]3 years ago
4 0

Answer:

When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.

You might be interested in
Which column and row references are updated when you copy the formula =$A1+B$10 Select all that apply.
lora16 [44]

Answer:

c

Explanation:

4 0
3 years ago
Read 2 more answers
Which statement describes the relationship between science and technology?
Elden [556K]
Answer: science is the study of the world, and technology changes the world to solve problems.
3 0
3 years ago
Read 2 more answers
What are the results of Maya’s conspicuous consumption? Check all that apply. - a lack of debt - stress about paying bills - a l
kifflom [539]

Answer:

stress about paying bills

a lack of money for other expenses

great electronic connectivity

Explanation:

The Maya classic period has seen the rise of conspicuous and mass consumption. In the given scenario all the expense her paid by credit cards and cash is rarely used. There will be a stress for paying bills. There will be lack of money available in hand for some routine expenses and mandatory purchases. It gives a great electronic connectivity. All the funds are considered as safe.

4 0
4 years ago
The ____ job functions and organizational roles focus on protecting the organization's information systems and stored informatio
dalvyx [7]

Answer:

Option B i.e., Information security management and professionals is the correct option.

Explanation:

They performs the work duties and operational responsibilities focus on supporting the information systems of the corporation and information stored against threats. IMS is a set of principles and protocols for the structured handling of sensitive information within an enterprise. An ISMS helps to eliminate risks and maintain continuity of operation through pro-actively minimizing the effects of a breach of security.

5 0
4 years ago
Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has
stiks02 [169]

Answer:

The solution code is written in Java.

  1. public class Main {
  2.    public static void main(String[] args) {
  3.        int n = 5;
  4.        int j;
  5.        do{
  6.            System.out.print("*");
  7.            n--;
  8.        }while(n > 0);
  9.    }
  10. }

Explanation:

Firstly, declare the variable n and assign it with value 5 (Line 4). Next declare another variable j.

Next, we create a do while loop to print the n-number of asterisks in one line using print method. In each iteration one "*" will be printed and proceed to the next iteration to print another "*" till the end of the loop. This is important to decrement the n by one before the end of a loop (Line 9) to ensure the loop will only run for n times.

5 0
4 years ago
Other questions:
  • What are the advantages and disadvantages of using thermoset plastics
    14·1 answer
  • What process makes one group a member of another group? nesting cloning copying grouping
    8·1 answer
  • Which command is used to encrypt all passwords in a router configuration file?
    6·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • What is the final amount stored in value if the computer selects 17 as the
    12·1 answer
  • Follow the directions below to submit Assignment 2:
    11·1 answer
  • The main work area of the computer is the
    14·2 answers
  • Match the vocabulary to the appropriate definition.
    13·1 answer
  • Online advertising includes: a. All of these are correct. b. ads in print newspapers. c. social media. d. listings on directory
    7·1 answer
  • Four ways to improve the performance of a hard disk include.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!