1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
8

What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how tha

t information is shared?
Computers and Technology
2 answers:
GaryK [48]3 years ago
8 0

Answer:

this is more of an opinion question regarding what you personally do

Tanya [424]3 years ago
8 0

Answer:

i mean the givens like age sex general location

You might be interested in
You can copy a selected shape by holding down the ____ key and then dragging the shape.
marshall27 [118]

Answer:

Option A is the correct choice answer for the above question.

Explanation:

In an MS-Powerpoint document, when a user wants to copy the selected shape and drag that shape for use in slides then he needs to--

  1. Select the shape
  2. Press the Ctrl key and
  3. drag that shape on the slide of the powerpoint.

Then the user gets the shape on the slide for their personal use.

The question scenario also suggests the same which is described above. hence Option A is the correct answer while the other is not because--

  • Option B suggests 'ESC' which is used to escape any running program.
  • Option C suggests about ALT key which is of no use for the MS-Powerpoint document.
  • Option D suggests about TAB key which is used to make the space between two texts or diagram.
5 0
3 years ago
Read 2 more answers
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
Am i in elementary yes no
IgorLugansk [536]

Answer:

no

Explanation:

7 0
3 years ago
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
Match the data type to the given data.
guapka [62]
Float: 26.2
Array: c, o, m, p, u, t, er
Boolean: false
Character: c
7 0
3 years ago
Other questions:
  • Perform online or offline research to learn more about film elements. Then, write a short report on the essentials of filmmaking
    13·1 answer
  • Jenny wants to create an animated short video to add to her website. Which software will she use to create this animated video?
    14·1 answer
  • These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
    14·1 answer
  • Network is a process by which several protocols evolve to form a single product.
    13·1 answer
  • What is are motor vehicle emissions?
    8·1 answer
  • In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of a
    10·1 answer
  • How many types of window in Qbasic​
    7·1 answer
  • Please help me !!
    10·1 answer
  • The startup routine runs,when machine boots up is known as​
    6·2 answers
  • What is a critical consideration on using cloud-based file sharing and storage applications.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!