1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
14

How can people make sure they are using credit cards responsibly

Computers and Technology
2 answers:
Ray Of Light [21]3 years ago
8 0
Set a buget based on monthly income
frez [133]3 years ago
8 0
The best answer is to not use a credit card to borrow money
You might be interested in
What are the disadvantages of using pointers?
garik1379 [7]

Explanation:

The pointer is the variable that will store the address of the other variable of the same datatype.

Following are the disadvantages of using a pointer.

1. Pointer sometimes causes a segmentation fault in the program.

2. Sometimes pointer leads to a memory leak.

3. A pointer variable is slower than normal variable.

4. Sometimes the program is crash if we using pointer because sufficient memory is not allocated during runtime.

5. If we using pointer it is difficult to find the error in the program.

5 0
3 years ago
Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
shepuryov [24]

Answer:

In case the data is arranged in the ascending order, you can always change the Binary search tree into a Height BST, and which is also known as the self-balancing BT. And through this, it's quite on hand to better the operations like searching on the new BST. And these SBBTs are quite commonly made use of for constructing as well as maintaining the ordered list. This is the case in the case of the priority queue, and this is what is required here.

Explanation:

Please check the answer.

3 0
4 years ago
Which will be displayed after the following process is completed?
Sergeu [11.5K]

Answer:

True

Explanation:

In this pseudocode the programmer defines 3 variables, x=1, y=2 and z=3, then he creates a conditional that states that if any of the previously defined variables has the value of 1 then a True will be displayed, on the other hand, if none of the variables has the value of 1 then a False will be displayed. In this case x=1, so it will display a True.

8 0
3 years ago
HTTP https CSS JavaScript and HTML are types of coding and formatting behind web pages true or false?
sveticcg [70]

Answer:

True

Explanation:

In order to be able to run a webpage successfully, there are various coding and formatting that are required and can considered necessary.

They are:

a) Hypertext Transfer Protocol(HTTP): This is a protocol that is made use of on webpages. It is used to determine the information or data that is collected and transmitted through webpages. The commands that are programmed on webpages are modified by this protocol. The data or information that can be transmitted using HTTP includes: Pictures, Video or Audio recordings e.t.c.

b) Hypertext Transfer Protocol Secure(HTTPS) : This is an advanced or modified form of HTTP. The difference between them is HTTPS is more secure than HTTP. HTTPS is defined as a more secured protocol thorough which data or information can be transmitted from one webpage to another. HTTPS make used of an encrypted type of security during data transmission.

c) Cascading Style (CSS): It is a computer language technology that helps to define and modify the way a webpage looks like. Cascading Style can be defined as a formatting style that deal with the fonts, colour , layout of a webpage.

d) JavaScript :This is a programming language that is used on webpages. It is a set of coding that has commands embedded insided that is written to make webpages more interactive and fun for the users of the Internet.

e)Hypertext Markup Language (HTML): This is what is used to create webpages on the internet. Hypertext Markup Language defines what a webpage actually looks like which involves, the written document on the webpage

7 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
Other questions:
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • The clicking of a form is _________________________.
    7·1 answer
  • Which one is it A,B,C,D
    10·2 answers
  • Which is a good guideline to follow for adding animation to a presentation?. A. Use a different animation for each slide.. B. Us
    8·2 answers
  • What’s the best way to figure out what wires what and goes where?
    8·1 answer
  • Which of the following companies develop, own, and provide travel products for people?
    8·1 answer
  • Split a string by string.
    6·1 answer
  • If Z=52 and ACT=48 then BAT=​ with explanation??​
    12·1 answer
  • Order the steps for accessing the junk email options in Outlook 2016
    9·2 answers
  • Please say me the answer fast its really urgent........ ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!