1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
14

give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop

le do.
Computers and Technology
2 answers:
blagie [28]3 years ago
5 0
I would not because you never know there could be hackers and they could get your card account and spend your money. If they get your card number and you do turn up with less money there is really nothing you can do about it at that point. That's why I wouldn't trust my money to an online bank. 

                                                   Hope this helps.
                                          Sincerely, Hodctilana
bixtya [17]3 years ago
4 0
I bank with an online bank for a couple reasons, lower fees, higher savings rates and the convenience of begin able to use any atm. To stay safe, I only bank from my home WiFi, or cellular connection and I ensure when I log on to my banks website, I verify that it’s in fact secure, and that it’s the correct domain.
You might be interested in
A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
Mandarinka [93]

The Problem is either File Management or Disk access but the most common issue is due to File management

5 0
3 years ago
Analyze the given word pattern and choose the correct option.
frozen [14]

Answer:

The code for DOOR would be <u>3775</u>.

Explanation:

WORD - 9753

W - 9

O - 7

R - 5

D - 3

DOOR: 3775

5 0
2 years ago
"this type of file contains data that has not been converted to text"
umka2103 [35]
A <span>Binary file has not been converted to text.</span>
7 0
3 years ago
What command would you run from a windows command line to test a computer's network stack?
Marizza181 [45]
<span>You should run the command ping 127.0.01 from a windows command line</span> to test a computer's network stack. The IP address 127.0.0.1 is standard IP address assigned to the network card once the network card driver has been installed correctly. This way it <span>can be tested if the computer is not connected to network.</span>
7 0
3 years ago
Storage.
Archy [21]

Answer:

Part A

1) Mouse

2) Monitor

3) Hard Disk

4) Joystick

Part B

i) An input device is used to provide input signal to the computer or other information technology system for processing

ii) scanners, joysticks, mouse, and keyboards

iii) a) A scanners is used to create digital image input

b) A joystick is mainly used in gaming

c) The (computer) mouse is moved on a flat surface to navigate the mouse pointer

d) A (computer) keyboard is used for data input into the

Explanation:

Part A

The list of the four basic hardware components of computer are;

1) Mouse

2) Monitor

3) Hard Disk

4) Joystick

Part B

i) An input device is an equipment with which computer control signal and data are entered into a computer or other forms of technology for processing information.

ii) Input devices includes, scanners, joysticks, mouse, and keyboards

iii) a) A scanners is used to create digital image input for the computing system

b) A joystick (mainly used in gaming) consists of stick with control buttons that pivots on an attached base whose movement and control button input are reported to the information technology processing system, such as a computer to which it is attached

c) The (computer) mouse is moved on a flat surface to navigate the mouse pointer displayed on a graphical user interface for controlling and operation of a computer

d) A (computer) keyboard is a primary computer input device that is very much similar to a typewriter keyboard in design and functioning

Data input to the computer are made by typing values using the keyboard

5 0
3 years ago
Other questions:
  • What does limited access to a document mean? A. It makes a document inaccessible without a password. B. It enables a person to m
    7·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • The first computer was developed by the government to spy on communist activities. Please select the best answer from the choice
    13·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name o
    12·1 answer
  • Why should the Six-Step Process be considered as an iterative process?
    8·1 answer
  • help help help help help help help help help help help help help help help help help help help help help help help​
    7·2 answers
  • Complete the sentences about interactive media.
    13·1 answer
  • Select the correct answer.
    8·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!