1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
2 years ago
12

Which of the following tips for using social network will help you keep your job

Computers and Technology
1 answer:
Ainat [17]2 years ago
3 0

Answer:

These are the best and most effective ways of using social media to get a job:

1.Share an online portfolio on social media.

2.Actively search for jobs on LinkedIn

3.Edit the privacy settings on your social media.

4.Engage in social media debates

5.Show your personality online.

You might be interested in
Hey does anyone know how to fix a computer that goes on and off. It is a Asus chromebook and putting it into recovery mode didn'
irina [24]

um just return itExplanation:

8 0
3 years ago
Read 2 more answers
642<br> +277<br> What does 642+277
svet-max [94.6K]
Answer:
642+277= 919
6 0
3 years ago
One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
Zarrin [17]

Answer:

A, Capital gains on the investment will be taxed at a lower rate.

Explanation:

5 0
3 years ago
Read 2 more answers
Explain how data is represent in the computer system
Alex Ar [27]

Explanation:

<h3>Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.</h3>

7 0
3 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Other questions:
  • What are the latest technology in 2014
    11·1 answer
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    10·1 answer
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • The four compass points can be abbreviated by single-letter strings as "N", "E", "S", and "W". Write a function turn_clockwise t
    15·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • Which type of writing is most commonly used in the field of information technology
    14·1 answer
  • Bits of information are combined into meaningful units so that more information can be held in short-term memory through the pro
    5·1 answer
  • Which of these sentences correctly shows how youngsters use the Internet?
    13·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!