1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
2 years ago
5

Which type of information should never be given out on social media?

Computers and Technology
2 answers:
zhenek [66]2 years ago
7 0

Answer:

Sites like Face.book are full of valuable data for people who use social engineering to steal your identity on social media. You should therefore avoid sharing information that's used to verify your identity,

Explanation:

Lorico [155]2 years ago
7 0

Answer:

An password of an account or personal data like Location of your house, name of your familiars or what age you got.

You might be interested in
If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?
Digiron [165]

Answer:

its 72

Explanation:

i know it because i did it and thats how i know it

6 0
2 years ago
Which tool is often used by devops to facilitate the development, testing, and deployment of new software?.
ella [17]

The Jenkins tool is often used by DevOps to facilitate the development, testing, and deployment of new software.

<h3>What is software development?</h3>

The practice of conceptualizing, planning, designing, coding, documenting, testing, and bug-fixing that went into building and maintaining applications, platforms, or other software modules is known as software creation.

Jenkins is a Java-based continuous integration/continuous delivery and deployment system that is free and open-source.

Thus, the Jenkins tool is often used by DevOps to facilitate the development, testing, and deployment of new software.

Learn more about software development here:

brainly.com/question/3188992

#SPJ4

3 0
1 year ago
)In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
kotykmax [81]

Answer:

B.add.

Explanation:

boolean add(element)

The add method in java inserts an element in the vector.It's return type is Boolean it returns true if the element is successfully inserted in the vector and false if the operation is unsuccessful.There is no Push operation in vector.Hence we conclude that the answer is add.

8 0
3 years ago
Measurement consists of:__________
Naddik [55]

Answer:

The answer is choice "a".

Explanation:

Measurement is a number allocation in which the entity or event attributes that would be comparable with other objects or events. Its scope and implementation depending on context and discipline.  

  • Its main purposes could be defined as measurements for efficiency, tracking, health, fitness (design, mounting), and solving problems.  
  • Its calculation consists of the numerical assignment, representing attribute amounts according to the rules for objects and events.
3 0
3 years ago
What device connects a lan's switch to the next network? qizzlets?
laila [671]
I think you can call it to a Network Switch, but LAN is always used device network: Hubs and Switch or maybe Connect Device or Cable.
6 0
2 years ago
Other questions:
  • Keith has to carry out a photo shoot to capture images of the ocean during the monsoons. What is a recommended practice when sho
    9·1 answer
  • In three to five sentences, describe how technology helps business professionals to be more efficient. Include examples of hardw
    10·1 answer
  • Renter’s insurance is not necessary if you don’t have a lot of expensive things.
    13·1 answer
  • Which of the following is true about occupations within the STEM fields? Many occupations use mathematics, even if it is not the
    11·2 answers
  • You have spent $4,000 on liquor for your bar. Your bar sales have been $24,000. What is your cost of sales for liquor, expressed
    5·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • A source is:
    15·2 answers
  • What are 3 examples of a idler gear in real life?
    7·1 answer
  • What are organization tools?
    14·1 answer
  • A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!