1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
4 years ago
15

What is my credit card billing zip code??

Computers and Technology
1 answer:
Angelina_Jolie [31]4 years ago
5 0
I guessing it should be on the back of the card
You might be interested in
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
In the following scenario, which is the least
mario62 [17]

Answer:

Size

Explanation:

Connectivity, they need internet to work.

Speed, they need it to work fast.

Storage, they need space to work.

Size, isn't all that important, unlike the rest.

7 0
3 years ago
Around the world, various brands of personal computers are sold with Pentium processors. This fact is often used as a selling po
natta225 [31]

Answer:

Co-branding.

Explanation:

Around the world, various brands of personal computers are sold with Pentium processors. This fact is often used as a selling point, with advertising that proclaims "Intel Inside." Co-branding concept do such advertising.

6 0
3 years ago
An outline is most like which of the following?
bija089 [108]
(b or a) im not sure
4 0
3 years ago
Read 2 more answers
Your Twitter recommendations will improve as you:
olga nikolaevna [1]

Answer:

C

Explanation:

Your profile on twitter can boost the relevance of your opinion to a tweet. When your profile shows less information or irrelevant information people tend to ignore you.

3 0
3 years ago
Other questions:
  • A website wants to gives out detailed information to viewers about its upcoming conference and also provides a feature for searc
    10·1 answer
  • ________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
    14·1 answer
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
    12·1 answer
  • The term "Big Data" is relative as it depends on the size of the using organization.
    14·1 answer
  • How do a tubercolosis test work?
    12·1 answer
  • A researcher develops a new instrument to measure coping skills and conducts a pilot study to compare the new tool with an exist
    5·1 answer
  • What is the definition of Overflow Error?
    5·1 answer
  • Einstein's famous equation states that the energy in an object at rest equals its mass times the squar of the speed of light. (T
    6·1 answer
  • A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence known a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!