1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
2 years ago
5

Which of the following safety and privacy features is not included in a P2P app or service?

Computers and Technology
2 answers:
diamong [38]2 years ago
3 0

The option that should not be included in the safety and privacy features is not included in a P2P app or service is the non-inclusion of Representative call for confirming payments over $100.

<h3>What is P2P application?</h3>

This is known to be a form of Peer-to-peer payment services. They are apps or application that has its features which helps one to be able  to  to send money to other people.

Conclusively, a Representative call that is made for confirmation of payments that is over $100 should not be included as people may use this kinds of call to defraud other people.

Learn more about privacy features  from

brainly.com/question/20533576

Svetlanka [38]2 years ago
3 0

Answer:

I don't know but I need help to

Explanation:

Help me to

You might be interested in
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
What general strategies can the network managers use to reduce congestions?
Harrizon [31]

Answer:

 There are different types of strategies that can be used by the network manager for reducing the congestion are as follows:

  • By monitoring the traffic of the network properly we can easily reduce the congestion in the network.
  • By segmenting the network properly, it helps to reduce the network congestion.
  • We can also reconfiguring the TCP/IP (Transmission control protocol) setting on the network.
  • We can also use the backpressure routing technique.

7 0
2 years ago
A triangle is an example of __________ .
inna [77]
 CONVEX polygon. 
An equilateral triangle is a triangle that has the same side length and same angles.

It is identified as a convex polygon because it does not have a reflex angle. 
A reflex angle is an angle that is greater than 180° but lesser than 360°. Interior angles of a triangle sum up to 180°.
7 0
3 years ago
True or false- the site that comes up in a google search is always the most accurate
nignag [31]
False  Internet is known for not being entirely accurate. you should go by other options as well before deciding to finalize it . Its like Brainly app, you always go with the one with the most times answered and its usually accurate.  Hope this helps.
3 0
3 years ago
Which element adds a page turn effect to the slides in a presentation
zepelin [54]

slide transition adds a page turn effect

6 0
3 years ago
Other questions:
  • Calculate the total number of bits transferred if 200 pages of ASCII data are sent using asynchronous serial data transfer. Assu
    5·1 answer
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • The design of a blog refers to:
    10·1 answer
  • HELP PLSSSSS!!! I WILL MARK BRAINLIEST FOR THE FIRST AND CORRECT ANSWER!!!
    14·2 answers
  • We can use formatting before and after typing.​
    8·1 answer
  • Transition words and phrase in a paragraph
    15·2 answers
  • 1.<br>is the office industry leader at the moment.​
    9·1 answer
  • How many discussion posts must you complete to meet the Expectations of the replies category
    11·1 answer
  • Where is the fill handle located
    7·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!