1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
8

What can a person do to help increase their credit score? AUse only a small percentage of your credit limit. BResearch student l

oan terms online. CCharge all monthly expenses to the same credit card. D Open a savings account at a bank.
Computers and Technology
1 answer:
spayn [35]3 years ago
5 0
A and c would both work for sure but i would probaly go with c
You might be interested in
When water reaches the pole, most of it turns to ice. Some salt is trapped between ice crystals, but most is left behind in the
astra-53 [7]

Answer:

b should be the right answer

Explanation:

8 0
3 years ago
Read 2 more answers
The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
zysi [14]

Answer:

Following are the solution to this question:

Please find the attachment of this code.

Explanation:

In this code, an email_list method is declared, that accepts a domains parameter, and in the next step, an empty list and two for loop are defined, in which the first for loop is used for a count parameter value and in the second loop is use the append method to add the given value, and use the return method to print its value, and use the print method to call the "email_list" method.  

3 0
3 years ago
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
3 years ago
What does mtu stand for
Nataliya [291]
Michigan technological University
8 0
3 years ago
Read 2 more answers
What is a pair of colors that are opposite to each other on the color wheel called?
Alinara [238K]

What is a pair of colors that are opposite to each other on the color wheel called?

D:Complementary


3 0
3 years ago
Read 2 more answers
Other questions:
  • Large Format Camera holds:
    8·1 answer
  • Stacey wants to change her document to landscape view instead of portrait. Jesse wants to change the scale of his document. Whic
    11·1 answer
  • How do you change ip?
    5·1 answer
  • Explain how it makes you feel that you must share the road with others
    15·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    13·2 answers
  • Select the correct answer
    5·2 answers
  • Spreadsheets: what is a column?
    15·1 answer
  • Edhesive 6.2
    6·2 answers
  • Which formatting options can be changed by selecting the Design tab? Check all that apply.
    7·2 answers
  • The network layer of the ISO/OSI model organize bits into ..........​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!