1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
12

Name at least four factors that are looked at when a lender considers whether you are creditworthy.

Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
6 0
Sepa la verga cx I don't even know this
You might be interested in
Write a function magicCheck that takes a one-dimensional array of size 16, a two-dimensional array of four rows and four columns
mixer [17]

Answer:

it is twon

Explanation:

because i did it haha

4 0
2 years ago
Plz help ASAP
Bogdan [553]

Answer:

D

Explanation:

fiber optic cables are generally used by isps which is why they call their internet fiber optic

8 0
3 years ago
What is sun and what does it do?
Vadim26 [7]
The sun heats up the earth
7 0
3 years ago
Read 2 more answers
SINCE I CANT SEE IT KANG LOOK
jekas [21]

Answer:

Drama

Explanation:

: 0

7 0
3 years ago
Read 2 more answers
Q. Which protocol would best serve to authorize users to access directory services?
Arlecino [84]

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

6 0
3 years ago
Other questions:
  • Which shortcut key aligns text to the center of a page?
    13·2 answers
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • How do switches and bridges learn where devices are located on a network?
    5·1 answer
  • How do you increase the amount of data in a sampled Google Analytics report?
    8·1 answer
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • During which phase of film making does the team outline their vision for the film?
    5·1 answer
  • In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
    14·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!