1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
8

1. What is the connection between a credit report and a credit score?

Computers and Technology
1 answer:
viktelen [127]3 years ago
5 0

Answer:

<em>Credit report: A credit report is a record of a consumer's credit history and serves as credit references. Credit score: A credit score is an algorithm that measures your credit risk based on the information in your credit report at one point in time.</em>

Hope this helps!!

You might be interested in
A network technician has made a UTP cable that is terminated as T586A on one end and T586B on the opposite end. What type of cab
serious [3.7K]

Answer:

<h3>CROSSOVER CABLE </h3>

Explanation:

Crossover Cable is used to connect same types of device.

Crossover Cable is very similar to straight-through, except that they have pair of

wires that crisscross. This allows the two devices to communicate at the same

time.

TIA/EIA 568A: White/Green-Green, White/Orange-Blue, White/Blue-Orange,

White/Brown-Brown

TIA/EIA 568B: White/Orange-Orange, White/Green-Blue, White/Blue-Green,

White/Brown-Brown

6 0
3 years ago
A partially filled array is normally used with __________.
earnstyle [38]
A halfway filled array is usually given with an accompanying figure variable that holds the number of items that are verily stored in the array.
If the array is devoid, then 0 is stored in this adaptable because there are no items in the array. Each time an item is farther to the array, the variable is incremented.
4 0
3 years ago
Estate settlement is provided by banks through
natali 33 [55]
I believe the trust department.
8 0
3 years ago
The______ technique helps you explode possible risks by providing access to risk areas identified in the past. It also provides
Natalka [10]

Answer:

Threat and Hazard Identification and Risk Assessment

Explanation:

Its the threat and hazard identification and risk assessment technique that helps in exploding possible risks, which have been identified in the past. Also, it lists the solutions that were being brought to use for getting rid of the risk, and also list the outcome. Thus, you get the complete picture of the risk involved through the THIRA. And thus, you can easily get rid of them.

6 0
4 years ago
Examine the evolution of the World Wide Web (WWW) in terms of the need for a general-purpose markup language. Provide your persp
creativ13 [48]

WWW is used to browse for view the webpage basically content is normally displayed as HTML pages.

In any browser's webpage irrespective of language been used output content display as HTML pages only.

<u>Explanation:</u>

  • In other methods is used XML format where it is opened and closed tag for every word editing XML file is very useful.
  • XML tools are ready is available where end-user can edit or create by for example notepad++ extra
  • It is a language designed to store the data in a specific format and easily process and used by a coding language or web pages.
4 0
3 years ago
Other questions:
  • Directions: pick the right letter for each number.
    11·2 answers
  • Which form of Internet communication would a consumer seek out if they wanted to get personal perspectives into a company and it
    15·1 answer
  • ___ is the technology used by smart phones to send text messages.
    6·1 answer
  • Match the limits of the user with an appropriate design response. 1. severe arthritis, unable to type or use a mouse on a reliab
    11·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • What term best describes when the scope of the project changes from what was initially agreed upon?
    8·1 answer
  • Select the correct answer.
    9·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • Who invented napier bone and when​
    14·2 answers
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!