Shanice has a younger sister, Leandra, who just got a computer for her birthday. Leandra wants to know how she can use the internet to interact with her friends. She also wants to know how she can stay safe on social media and avoid cyberbullies. What should Shanice tell her? can someone please answer this question.

Answers

Answer 1
Leandra should make whatever social media accounts she has or would make private. If they are private she can limit who she wants on her feeds.

Related Questions

!!GIVING 100 POINTS AND BRAINIEST T IF YOU HELP IMMEDIATELY!!
Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highest to lowest price?

Graph
Filter
Search
Sort

Answers

Sort allows Cameron to sort the data lowest to highest price or highest to lowest.

search = find a specific data input.

filter = remove and find specific data inputs.

graph = to display every database data on a graph and compare.

Answer:

sort

Explanation:

She needs to sort out the items The order is from highest to lowest.So the sort feature is best help for her

what is auser mannual​

Answers

Answer:

Contains information for user to make use of all information

Explanation:

A user guide, also commonly known as a user manual, is intended to assist users in using a particular product, service or application. It's usually written by a technician, product developer, or a company's customer service staff. User guide are often included with the purchase of household

How to create drop down list in excel with multiple selections.

Answers

Answer:

elect the cell or cells you want the drop-down list to appear in.

Click on the Data tab on Excel's ribbon.

Click on the Data Validation button in the Data Tools group.

In the Data Validation dialog, in the Allow: list select List.

Click in the Source: box.

Explanation:

A monitor is an output device. Which of the following is not a type of monitor? *

Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes

Answers

Answer:

cathode ray tube is the correct answer

Anyone knows the answer for 6. 1. 4 Happy Birthday! codehs

Answers

The birthday program is an illustration of a sequential program

What are sequential programs?

Sequential programs are programs that do not make use of loops and conditional statements

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This prints Happy birthday

print("Happy birthday")

Read more about Python programs at:

https://brainly.com/question/26980955

How do i copy a canvas course from old class to new course.

Answers

Answer:

Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.

Explanation:

Follow The Steps

That's it

Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted if the input is positive and odd. Otherwise, return rejected.

Answers

The program is an illustration of functions.

What are functions?

Functions are set of program statements that are executed when called or evoked.

The main program

The function written in Python, where comments are used to explain each line of the program is as follows:

#This defines the function

def posodd_number_filter(num):

   #This checks if the function is odd and positive

   if num >0 and num%2 ==1:

       #If yes, this returns Accepted

       return "Accepted"

   #If no, this returns Rejected

   return "Rejected"

Read more about functions at:

https://brainly.com/question/14284563

an existing technology that would allow users to transfer images from the camera to the computer without connecting them

Answers

Answer:

wireless technology i guess??

Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.

Answers

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

What is Data protection policy?

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here https://brainly.com/question/26493645

I need to code a simple racing game in c++. Help, please. ​

Answers

Can you attach what you have so far

What are two advantages and disadvantages of using computer software?

Answers

Answer:

Advantages:

Multitasking

Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.

Speed –

Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.

Disadvantages:

Virus and hacking attacks –

Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.

Online Cyber Crimes –

Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.

Advantage: It does EXACTLY what the programmer told it to do.

Disadvantage: It does EXACTLY what the programmer told it to do.

Software is instructions for a computer to follow. A computer will do so virtually always without fail other than the rare hardware or power issues, even in cases where it shouldn’t, and even in cases where any human would instinctively know that the instructions do not apply. I compare programming to writing instructions for a robotic idiot. It must be perfect, it must address every minute detail, and it must handle every case that will ever arise correctly. Humans write software. Perfection is rare for humans.

What needs to be done before depositing a check using a mobile app?

Answers

Answer:

The check needs to be signed in the back by you or whoever is depositing it.

Answer:

Choose the account you want to deposit the check to. Enter the check amount. Take a photo of the front and back of the check using your mobile device's camera. Review the deposit details, then hit submit, if they're correct, to process your deposit.

Explanation:

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system

Answers

“Interrupt” is what I think the answer is

HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.

Answers

Answer:

My goal is to have good grades because I failing now and I want to try and try to get my grade up

Explanation:

4 brainly

What do Web designers do? *


What's the difference between web design and web development? *


How many types of web design are there? *


Is Web Design graphic design


What are the 3 types of websites? *

Answers

Web designers like create websites for businesses

What is the name of the proicess of submitting and checking credentials to valideate or prove user identiy

Answers

Answer:

Authentication

Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose

Answers

The type of instances would you use for this purpose is known as On-Demand.

What is an on demand instance?

On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.

This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.

Learn more about cloud from

https://brainly.com/question/25130975

help! giving a lot of points I need this asap!

Answers

Answer:

89.3

you add them all & then divide

Explanation:

How can you quickly locate emails with large attachments.

Answers

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

How do I find emails by attachment size?

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

https://brainly.com/question/978078

Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work

2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.​

Answers

Answer:

1. C. or D.

2. Hadoop is a popular Java-based framework used for storing and processing big data.​

Explanation:

For number 1 I think it's C because:

A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!

Hope you do well!

True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False

Answers

Answer:

True

Explanation:

During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use

Answers

The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

What is an Entrance Animation?

An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.

For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.

Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

Learn more about entrance animation on:

https://brainly.com/question/20082198

1. What projects would Excel best be used for?

Please be sure to say the name of the project(s) and how you would go about creating it.

Answers

Answer:

Charting, inventory tracking, accounting  and calculating

Explanation:

im assuming you are writing the response instead of a multiple choice.

hope this helps :D

How to turn off notifications for a class in canvas.

Answers

Answer:

by clicking the View Course Notifications button and then on the resulting screen, clicking the green check next to Enable Notifications.

Explanation:

Follow This Step and Read

the bookstore sold 8 books for $66 at that rate how much was one book

Answers

8x=66

8x/8 = 66/8

x=8.25$

What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *

Answers

FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.

What tradeoff must the Administrator consider when using FTP?

Although the FTP is insecure, it is a very fast way of transferring files.

When the connection is lost during file transfer, it is possible to resume such a transfer.

It also allows for queuing, scheduling, uploading, and downloading of files.

The full meaning of SMTP is Simple Email Transfer Protocol.

Learn more about FTP and SMTP at:

https://brainly.com/question/17506968

https://brainly.com/question/14396938

Which call of the function correctly follows the instructions laid out in the api?.

Answers

Answer:

MoveElement("button1", "down", 25); This function finds the minimum number in a list.

Explanation:

Hope this helps

Project: Design and Development Research Project
a team at work

A team (Imagery supplied by RicardoImagen/iStock via Getty)
Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
Write a question (or questions) to be answered by your research.
Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper, or a documentary. When in doubt, ask your teacher.
Unacceptable sources include Wikipedia, an individual’s blog, and social media, except as examples not counted as sources.
Create a document using Word (or a similar word-processing application) as described below.
Your Word Document Requirements
Part 1: Name
Your name
Names of your partner(s) (Include the names of people in your group if this is a group project.)
Part 2: Title
Part 3: Questions to Answer
Part 4: Introduction
A paragraph that introduces your topic and the question(s) to be answered
Part 5: Exposition
An explanation of how you answered the question(s); give credit to your sources, whether using direct quotes or not
Part 6: Conclusion
A paragraph summarizing your analysis
Part 7: Bibliography
Part 8: Partner Participation (only included for those working in groups)
Describe the role and responsibilities of each member of the group.
What to Submit
You will submit the Word document described above. You can use this rubric to evaluate your project before you submit it.

Answers

The correct steps which are used to make a research are as follows:

Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusions

What is a Research?

This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.

With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.

Read more about research here:
https://brainly.com/question/968894

Answer:

sorry i know this is late, but hopefully it will help someone else!

have a lovely day <3

when was the first computer built..

Answers

Answer:

1822 but it was a medical computer. not the same as computers today

Explanation:

The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.

Hope this helps!

What is the term for when software is installed on a computer without authorization and encrypts files and demands payments in bitcoin before the password to encrypt the files will be provided?.

Answers

Ransomware

Explanation: Cause I’m like that
Other Questions
A cone has a slant length of 5 and a diameter of 4. What is the volume of the cone? Use 3. 14. 12. 56 cubic units 18. 84 cubic units 20. 93 cubic units 25. 12 cubic units. 100 PTS PLS I NEED ITWhich problem can be solved by performing this multiplication?3/48/9A. Three out of 4 containers hold lemonade. Each container holds 8/9 quart of lemonade. How much lemonade do the containers all hold?B. Evan practiced piano this week for 3/4 hour. Last week he practice for8/9 hour. How much longer did Evan practice last week than this week?C. Jada rode her bike 3/4 mile. Sarah rode her bike 8/9the distance that Jada rode her bike. How far did Sarah ride her bike? D. Amelie drove 3/4 mile. She then drove another 8/9 mile. How many miles did she drive in all? use an example from the text that demonstrates how the walls children view living in poverty as an adventure like thier parents taught them? The volume of a cube can be found using the equation V = s, where V is the volume and s is the measure of one side of the cube. Match the equation for how to solve for the side length of a cube to its description. Drag the equation to the box to match the description. A cube has a volume of 729 in. Please help! I really need help!!Factor: 12x^2 + 14x + 12 = 18 Show work What are 10 words that can be used to explain what a right triangle is? 10 points for 10 words 3/m = 45/50 HELP, WILL GIVE BRAINLIST IF PERFECT ANSWER, its hard A client with osteoporosis has been medically cleared to perform exercise. Which form of training can have the most impact on increasing the client's bone mineral density answer below please! One goal of nativist groups in the late 1800s was When dyson, best known for its revolutionary vacuum cleaner, introduced the dyson supersonic hair dryer, it used _______. PLEASE HELP ME QUICK!!Kelvin wants to know whether he skied without falling more than twice as long as anyone else in his family. His dad tells him that he can check by using the inequality 2f < 223, where f is the time skied in seconds for each person. Plug the values for the time skied by each person into the inequality to find the answer. Best quote for encouraging others.If u can provide any biblical Verse that would be excellent .Don't dare to post irrelevant answers.Thank you Scientists compare two different plant species. In species A, the leaf color iscontrolled by two alleles. In species B, leaf color is controlled by five alleles.How will these two plants be different? A. Species A will have a wider range of phenotypes. B. Species B will have more offspring. C. Species B will have a wider range of leaf colors. D. Species A will have a wider range of genotypes Are pterosaurs more closely related to turtles or to crocodilians? Explain your answer.(sorry for spam questions i need help so i can get a higher grade in science) Gracie is scheduled to take an intelligence test that will measure the level of knowledge and understanding she has acquired in her life thus far. Gracie is about to take a(n) _____ PLOT THE POINT [1.5 -2] PLS HELP ASAP If a body is buried, the process of complete _____ can take up to two years to complete.1. adipocere2. mummification3. skeletonization4. putrefaction When checking for paragraph unity, you should be concerned with which of the following factors? Check all that apply. Justines classmate David is writing a paper that claims hurricanes can cause more damage than tornadoes. He made a list of the following facts about hurricanes:Which piece of evidence best supports Davids claim that hurricanes are more destructive than tornadoes? A. There are five categories of hurricane intensity. B. Hurricanes can impact a much larger area of land. C. Hurricanes can last for weeks over water, giving advance warning. D. Hurricanes first form over warm water in the tropics before reaching land.