1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
1 year ago
11

The short-range two-way communication technology behind contactless payments is called ____.

Computers and Technology
1 answer:
iogann1982 [59]1 year ago
8 0

Answer:The answer is near field communication.

Explanation:

You might be interested in
Write a C program to perform simple C arithmetic calculations. The user is to enter a simple expression (integer operator intege
Ilya [14]

Answer:

Input example:

select the funcion: 1                                                                                                                  

write the 1sd number2                                                                                                                  

write the 2nd number1                                                                                                                  

value is 2.000000                                                                                                                      

Explanation:

#include <stdio.h>

main()

{

//define the variables as float

float a, b, c, e;

char d;

while (1)  

{      

//input values

printf("select the function: ");

scanf("%c",&d);

printf("write the 1sd number");

scanf("%f",&a);

getchar();

printf("write the 2nd number");

scanf("%f",&b);

getchar();

if (d=='%')

{

    a=a*b/100;

}

if (d=='*')

{

    a=a*b;

}

if (d=='+')

{

    a=a+b;

}

if (d=='/')

{

    a=a/b;

}

if (d=='-')

{

    a=a-b;

}

printf("value is %f \n",a);

}

printf("final value is %f",a);

getchar();

}

8 0
4 years ago
A computer that connects to a powerful computer on a network is called a ______. boss client kid server
Luba_88 [7]
Server is the answer i believe.

4 0
3 years ago
Read 2 more answers
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Why are the relational operators called relational?
Pie
If you think about it, all "relational operators" are used to test some kind of relationship between two objects or entities. :)
3 0
4 years ago
Read 2 more answers
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operation
Vladimir79 [104]

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

<h3>What is a breach?</h3>

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

brainly.com/question/13885689

#SPJ1

8 0
2 years ago
Other questions:
  • Two technicians are explaining automotive computer control. Technician A says that the volt is used as a signal for a computer-c
    13·2 answers
  • Effective resource management: a. Locks out unauthorized access and can work to prevent changes to resources by internal users n
    8·1 answer
  • Flesh out the body of the print_seconds function so that it prints the total amount of seconds given the hours, minutes, and sec
    12·1 answer
  • Double[][] vals = {{1.1, 1.3, 1.5},
    14·1 answer
  • When setting up a file system that is intended to be shared among several users, it is good practice to configure permissions so
    5·1 answer
  • Difference between Hard copy and Soft copy?​
    13·1 answer
  • CHALLENGE ACTIVITY
    6·1 answer
  • Why should you delete files from your computer?
    8·2 answers
  • Activity #2
    13·1 answer
  • Project 12-2: Bird Counter
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!