Computers and Technology

You have a friend who has a strong online presence, and really seems to flourish when interacting with people over the internet. however, there is also a negative aspect to his behavior—he sometimes says things he should not, and speaks poorly about his boss, his job, certain family members, and some of his friends. he makes extremely tasteless and inappropriate jokes, including some that border on violence. you know your friend and you know he is not actually dangerous, but you warn him to watch his online behavior. he ensures you that you have nothing to worry about, because he only posts controversial content anonymously. what should you tell him about posting “anonymously” and digital privacy?

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 08:00, lindseyreneesmith7
Digital information is stored using a series of ones and zeros. computers are digital machines because they can only read information as on or off –1 or 0. this method of computation is known as the system
Answers: 1
image
Computers and Technology, 23.06.2019 04:31, caseypearson377
Acloud service provider uses the internet to deliver a computing environment for developing, running, and managing software applications. which cloud service model does the provider offer? a. iaas b. caas c. maas d. paas e. saas
Answers: 1
image
Computers and Technology, 23.06.2019 12:50, tommy4260
Which syntax error in programming is unlikely to be highlighted by a compiler or an interpreter? a variable name misspelling a missing space a comma in place of a period a missing closing quotation mark
Answers: 1
image
Computers and Technology, 23.06.2019 14:30, officialrogerfp3gf2s
Select the correct answer. a company wants to use online methods to target more customers. it decides to conduct a market research by collecting the data of a few customers with their consent. they want to track data of the sites that their customers frequently visit. which software can the company? a. spyware b. bots c. adware d. trojan horse e. rootkits
Answers: 1
Do you know the correct answer?
You have a friend who has a strong online presence, and really seems to flourish when interacting wi...

Questions in other subjects:

Konu
History, 23.06.2021 05:30