1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
5

In what areas is Leslie's underspending hurting her budget select all that apply

Computers and Technology
1 answer:
mestny [16]3 years ago
3 0

Leslie's budget is hurting in the areas of transportation, groceries, phone and dining out.                                                                                                                                                    

<u>Explanation</u>:

  • For transportation, money is required for each day. So Leslie is spending more on transportation each month. For coming and going out anywhere she will be spending money on transportation.
  • She is also spending money on groceries. Groceries will be a necessary one for living nowadays. So the budget is hurting in that area.
  • She is spending another hand on the phone and dining out. For the phone, she will be recharging every month. She will be dining out with friends every day.

You might be interested in
Examples of structures that can store homogeneous data element​
erastova [34]

Answer:

They can store numbers, strings, boolean values (true and false), characters, objects, and so on

Explanation: Arrays are classified as Homogeneous Data Structures because they store elements of the same type. Hope this helps.

3 0
3 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
kiruha [24]

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
baherus [9]

Answer:

1922

Explanation:

i looked it up When was the Ethics Resource Center (ERC) established?

4 0
3 years ago
How many binary digits does a single hexadecimal digit represent?
Lera25 [3.4K]

Four binary digits

A single hexadecimal digit can represent four binary digits.

5 0
3 years ago
Other questions:
  • In this digital age of rapid communications, how can you justify the time it takes to stop and revise a message
    10·1 answer
  • In the processes tab of task manager, the ____ tab displays the âworking setâ of a process, or the amount of memory it is active
    12·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    11·1 answer
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • Brainliest for correct answer
    13·2 answers
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
  • Question 7 (1 point)
    10·1 answer
  • Which digital cellular standard is used widely throughout the world except the united states?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!