1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
2 years ago
11

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption

to encrypt their customers' credit card information. Is this a secure form of payment
Computers and Technology
1 answer:
arlik [135]2 years ago
8 0
Somewhat they store the credit info
You might be interested in
What is the weirdest thing u saw at school asking teachers and students
patriot [66]
I walked in the bathroom and i see my friends showing eachothers butt.
Also i threw a bag of poop at my friend
5 0
3 years ago
Read 2 more answers
Desktop operating systems sometimes are called ______ operating systems because they also work in conjunction with a server oper
valina [46]
<span>Client, because they are a part of the server operating system request line. The client asks for a request for information or data from the provider (the server) and the server provides this to its client (the desktop computer). They work together hand in hand one is recieving information and one is sending information</span>
4 0
4 years ago
Pls paanswer asap......​
Artist 52 [7]

Answer:

Bro if you are really doing this on your phone or on a device look it up

Explanation:

Sorry for killing it, but dude, look it up on your phone, it doesn't take that long, it takes longer to wait for a response.

6 0
3 years ago
Write a class of complex numbers consisting of:
Gnom [1K]

Answer:

hi sorry for not knowing the answer

but please follow have a great day,night, or afternoon

3 0
3 years ago
Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she t
Yuki888 [10]

Answer:

1. b.

2. c.

4. d.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose you want to delete an existing file from within Word. What would you do? A. Click on the File button, choose Recent, ope
    9·1 answer
  • Which is the highest level of the hierarchy of needs model?
    5·2 answers
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • Corey set up his presentation for delivery to his team. The information he had to convey was critical to their job performance.
    6·3 answers
  • You will be administratively suspended if you have a breath or blood alcohol level of.... or above or refuse to submit to a chem
    12·1 answer
  • What information is kept in the cached lookups folder for a dns server?
    9·1 answer
  • What are a few ways to format the text in a mail message in Outlook? Check all that apply.
    7·2 answers
  • Which one of the following does NOT contain a
    9·2 answers
  • Exam Instructions
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!