1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
8

What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how tha

t information is shared?
Computers and Technology
2 answers:
GaryK [48]3 years ago
8 0

Answer:

this is more of an opinion question regarding what you personally do

Tanya [424]3 years ago
8 0

Answer:

i mean the givens like age sex general location

You might be interested in
Which position is expected to be at the center of the action providing complete technology solutions for a business?
dedylja [7]

IT Manager is expected to be at the center of the action providing complete technology solutions for a business.

Explanation:

An Information Technology Manager (IT Manager) is responsible for implementing and maintaining an organization's technology infrastructure.

IT Manager Roles:

  • Monitors the organization's operational requirements
  • Manages the data center
  • Maintains information technology strategies
  • Manages staff
  • Maintains a safe and secure work environment
  • Initiates, coordinates, and enforces systems, policies, and procedures

Education and Experience Requirements:

  • Bachelor’s or master’s degree in a computer science
  • Five or more years of IT work experience
  • Optional product or system certification
4 0
4 years ago
Choose the type of error described.
Bingel [31]

Answer:

first scenario: B

second scenario: C

third scenario: A

hope this helps! :-)

4 0
3 years ago
In this exercise we will practice using loops to handle collections/containers. Your job is to write a program that asks the use
kati45 [8]

Answer:

In Python:

chars = 'abcdefghijklmnopqrstuvwxyz'

letter = input("Sentence: ")

for i in range(len(chars)):

   count = 0

   for j in range(len(letter)):

       if chars[i] == letter[j].lower():

           count = count + 1

   if count > 0 :

       print(chars[i]+": "+str(count)+" times")

Explanation:

This initializes the characters of alphabet from a-z

chars = 'abcdefghijklmnopqrstuvwxyz'

This prompts the user for sentence

letter = input("Sentence: ")

This iterates through the initialized characters

for i in range(len(chars)):

This initializes count to 0

   count = 0

This iterates through the input sentence

   for j in range(len(letter)):

This compares the characters of the sentence with alphabet a-z

       if chars[i] == letter[j].lower():

If there is a match, count is incremented by 1

           count = count + 1

If there is an occurrence of character,

   if count > 0 :

The character and its count is printed

       print(chars[i]+": "+str(count)+" times")

5 0
3 years ago
Jeroo Bob has just awoken from a long night's sleep and is hungry for some winsum flowers. He walks out of
IgorLugansk [536]

Answer:

bro this is long try something easy

Explanation:

im lazy to read

7 0
3 years ago
After setting up an Internet connection, you cannot connect to Internet websites, just company intranet sites. What is MOST like
Masteriza [31]

Answer:Proxy setting

Explanation:

The proxy setting Is where it control the wifi because its connects to the wifi and the router doesn't find the proxy it does not work.

7 0
3 years ago
Other questions:
  • The efficiency of a screw is low because of _____. width friction length height
    10·2 answers
  • --------------communication involves one speaker andaudience.
    12·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    10·1 answer
  • What does pdf stand for in computer terms?
    15·1 answer
  • C++ what is wrong with my equation?
    10·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • I need help thanks please!
    8·2 answers
  • Which of the following is not part of the processes involved in data valida
    11·1 answer
  • If background option when creating file. the color of the background is
    10·2 answers
  • 3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!