1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
5

When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by

the app store. on what type of device is the credit card number kept by the app store?
Computers and Technology
1 answer:
cupoosta [38]3 years ago
6 0
Here is the answer. When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by the app store, and the type of device that <span>the credit card number is kept by the app store is called the STORAGE. Hope this helps.</span>
You might be interested in
Q13. On which option do you click to
fredd [130]

Answer:

The answer is "Home cells Or Home Tab".

Explanation:

The Excel Home Tab is also known as the home cell, it also is used to execute the standard commands like bold, highlight, copy/paste. It also uses templates in a worksheet for cells, which is used to Insert and Delete Cells, and the wrong cell can be defined as follows:

  • In choice Formulas cell or Tab it is used to add the formula, that's why it is wrong.
  • On the choice page cell or Tab is used to view the data, that's why it is wrong.
5 0
3 years ago
Software that function as an electronic file cabinet
Airida [17]

Answer:

The answer to this question is "Document management software".

Explanation:

Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.

  • This software controls many fields, that are Storage location, Security and access control, Version control, etc.
  • It is a common component, that is found in an Enterprise Content Management environment, that uses this software.

7 0
3 years ago
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
Without any formal planning, the president of a software company remarks in a speech that new technologically advanced software
Sphinxa [80]

Answer: The reducing project duration was caused by the emergence of new technology.

Explanation:

Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity.

5 0
3 years ago
What are benefits of using debugging tools? Check all that apply.
vivado [14]

Answer:

It's

A. Debugging tools help programmers catch errors they might otherwise miss.

B. Debugging tools can save time.

D. Debugging tools help programmers make methodical assessments of the problem.

Explanation:

got it right on edge.

6 0
3 years ago
Other questions:
  • Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
    13·1 answer
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • I prefer a job where I am praise for good performance or I am accountable for results
    13·1 answer
  • As a general rule, the number of bullet points on a slide should not exceed _____. a.2 b.4 c.8 d.10
    9·1 answer
  • What does the "zoom tool" do in Photoshop?
    15·2 answers
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • Artificial intelligence (AI) and machine learning are especially important during which security information and event managemen
    8·1 answer
  • How do you save a document in a format so that any reader can view it?
    5·1 answer
  • What stipulates that the source code of any software published under its license must be freely available.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!