1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
6

Tips for staying safe using social media. Using in your own words.

Computers and Technology
1 answer:
OLga [1]3 years ago
7 0

Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.

Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.

In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.

You might be interested in
Choose all items that represent HTML characteristics.
hram777 [196]

Answer:

A,C,D,E are the answers at least on the test i took

Explanation:

3 0
3 years ago
Read 2 more answers
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
2 years ago
Read 2 more answers
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the orga
lawyer [7]

The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

<h3>What are servers?</h3>

A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.

Note that in the case above, The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

Learn more about servers from

brainly.com/question/17062016

#SPJ1

8 0
1 year ago
This is Microsoft Word. ONLY RIGHT ANSWERS. 50 points
pishuonlain [190]
She should select the first sentence then press and hold ALT while selecting the second sentence
5 0
2 years ago
Other questions:
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • Which of the following is the best definition of being a “digital citizen”?
    6·2 answers
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • What is the name of the advanced warrior race of robots in Doctor Who?
    10·2 answers
  • What are some benefits of 3-D printing?
    9·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • How to write conclusion of hard disk​
    11·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • In high-tech fields, industry standards rarely change.<br> True <br> False
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!