1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
14

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di

d you do? What was the outcome?
Computers and Technology
1 answer:
aalyn [17]3 years ago
5 0

Answer:

I introduced my sister to a thrift app called “Jongo”

Explanation:

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What did you do? What was the outcome?

While growing up, my sister runs a monthly thrift in our small community, where she collects daily contribution from our neighbors. She does this manually by going around and collecting cash from them. In addition to the risk of cash handling, it was quite stressful and tasking.  

Considering all these, I had to introduce her to a mobile app called “Jongo”, it made the job look easy. All my sister had to do was  

1. Download the app for herself and the contributors  

2. Add them to a group which she created on the app

3. The contributors linked their debit cards to the app and granted access for their account to be debited daily

Due to the cumulative funds, interests was also been accrued daily, hence making it much more easy to do other things in addition to her thrift.  

You might be interested in
Your search google for recipe for tonight dinner is an.example of ?​
Rina8888 [55]

The example is, ethier you need cooking classes or you wish to try something new

Hope the little humor helps

3 0
3 years ago
Read 2 more answers
The means by which an operating system or any other program interacts with the user is called th
natulia [17]
Networking capabilities of a computer
7 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
What would you need to have on your foley stage
LUCKY_DIMON [66]
<span>You will need many props for your Specific tracks (whatever you see in the film!). It's impossible to say what you will need until you see the picture and as time goes by you will add to your collection (if you have space!) - garbage day in my neighborhood is 'golden day' as I collect some of best props from the stuff people throw out: old bicycles, doors, sinks, wood, metal, desks, etc.</span>
4 0
3 years ago
What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
VARVARA [1.3K]

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

8 0
3 years ago
Other questions:
  • Hub is used in Twisted pair Ethernet. True/False
    6·1 answer
  • Someone help me I don’t know what to do /COMPUTER SCIENCE
    5·1 answer
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • Which 2 processes are operational processes
    10·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • Identify two real-world examples of problems whose solutions do scale well
    13·1 answer
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!