1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
2 years ago
8

25 POINTS!!!!!!!!!!!!!

Computers and Technology
2 answers:
Paladinen [302]2 years ago
7 0
A leaking data exhaust
telo118 [61]2 years ago
3 0

Answer:

A passive digital footprint(i think)

Explanation:

Passive digital footprint - Websites that install cookies on your devices, apps and websites that use your geolocation, and social media that uses your likes, shares and comments to profiles

leaking data exhaust - the data generated as trails or information byproducts resulting from all digital or online activities.

An active digital footprint - where the user has deliberately shared information about themselves either by using social media sites

Active day exhaust - the trail of data left by the activities of an Internet or other computer 

You might be interested in
Choose the true statement below. Question 8 options: A) The content that displays in the browser is contained in the head sectio
Rzqust [24]

Answer:

a. The content that displays in the browser is contained in the head section.

5 0
3 years ago
Olivia wants to add buttons and clickable features to her website. Which language should she use?
Feliz [49]

B. HTML. I hope this helps!!!

8 0
3 years ago
Read 2 more answers
3.1.1 What type of goods are car radio and remote control.​
Nuetrik [128]

Answer:

Radio Controlled cars .

4 0
3 years ago
What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative enti
castortr0y [4]

Answer:

The definition including its given problem is outlined in the following segment on the clarification.

Explanation:

  • Entity-relationship (ER) diagram describes how mechanical stored procedures are constructed and demonstrate the overarching representation of the situation. It also describes the connections between some of the entities of the framework and even the comparison with standard measurements.
  • For something like an individual relationship structure, the normal representation of connections seems to be a diamond. Associative institutions have several to many partnerships to communicate with. It's indeed the verb throughout a diamond-shaped form that holds two organizations around each other. This verb is in fact an entity on its own, therefore it must be termed an associative entity.
  • An illustration of such might be if a participant were to register for a class. Multiple individuals will be registered for several courses, and there have been many to several relationships; thus, the associative object will indeed register.
4 0
3 years ago
What tab should you choose if you want to practice presenting with your PowerPoint slides?
dezoksy [38]

Answer:

i think its slideshow tab

Explanation:

tell me if im right

6 0
3 years ago
Read 2 more answers
Other questions:
  • The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16,
    9·1 answer
  • Which of the following statements is true of a database? a. It is a collection of unstructured data. b. It is accessed primarily
    14·1 answer
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • 5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
    13·1 answer
  • Only business writing requires an editing stage
    8·1 answer
  • Which of the examples is part of client-side code?
    12·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • The Power of If Worksheet
    13·2 answers
  • There are many ways you can improve the performance of a website from an SEO perspective. When it comes to link building, which
    15·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!