1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
2 years ago
14

give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop

le do.
Computers and Technology
2 answers:
blagie [28]2 years ago
5 0
I would not because you never know there could be hackers and they could get your card account and spend your money. If they get your card number and you do turn up with less money there is really nothing you can do about it at that point. That's why I wouldn't trust my money to an online bank. 

                                                   Hope this helps.
                                          Sincerely, Hodctilana
bixtya [17]2 years ago
4 0
I bank with an online bank for a couple reasons, lower fees, higher savings rates and the convenience of begin able to use any atm. To stay safe, I only bank from my home WiFi, or cellular connection and I ensure when I log on to my banks website, I verify that it’s in fact secure, and that it’s the correct domain.
You might be interested in
_______ is a communications protocol used to send information over the web. HyperText Markup Language (HTML). URL (Uniform Resou
nlexa [21]

TCP/IP is a communications protocol used to send information over the web.

Explanation:

TCP / IP, which stands for the Transmission Control Protocol / Internet Protocol, is a set of communication protocols used to connect internet network devices. The whole suite of the Internet Protocol — a set of rules and procedures — is commonly called TCP / IP.  

The TCP / IP protocol suite acts as a layer of abstraction between web applications and the routing / switching fabric. TCP / IP defines how data is shared over the internet by supplying end-to-end communications that specify how the data should be split into packets, signed, distributed, routed and received at the destination.

5 0
3 years ago
ABC company have lots of computer running window 7. But they are not thinking to upgrade a higher version of window. One of the
Alexxx [7]

First threat

  • It's malware
  • Because chrome OS is not much secure as compare to windows 11 (Prime opponent)

2nd threat

  • It's speed
  • Chrome OS is litreally very slow .
  • On comparing to windows edition it lacks in multiple factor so you work per unit tike decreases

Third threat

  • You may be able to use Android apps but windows is made for Computers
  • In several factors like ads,cleanness chrome OS will create problems
5 0
2 years ago
In Python which is the correct method to load a module math?
Wittaler [7]

Answer: The math module is a standard module in Python and is always available. To use mathematical functions under this module, you have to import the module using import math .

Explanation:

3 0
2 years ago
Which of the following is NOT a destination?
prisoha [69]

Answer: Hi im Sergeant von im here to help you in any way ma'm;)

I would think it would be the last one ( A SCANNER ) i hope this maybe the right answer if not im sorry at least i gave it a shot

Explanation:

The last one " a scanner " is the one i would choose ma'm it seems logic the the Question and seems too fit in with the rest ;)

Have a good day ma'm

5 0
3 years ago
Read 2 more answers
The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.
enyata [817]

Answer:

Meta tag

Explanation:

5 0
3 years ago
Other questions:
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    9·2 answers
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • Please answers the questions 1-15
    6·1 answer
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • Edhesive 7.6 lesson practice python
    11·1 answer
  • Hello everyone! can anybody help me? i need help with computing.
    10·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!