1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
15

1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is

also asked to enter his nick name, the names of any pets, and his mom's maiden name. Should he do it?
A) Do it. The questions are silly, but it's worth it to win $10,000.
B) Don't. Identity thieves use such "clues" to figure out people's passwords.
2. Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security Number (SSN) right away or he will lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
A) Do it. It's an official notice from a company and if he waits, he could lose everything.
B) Don't. Real companies don't do this. Thieves use such information to create false identities.
3. Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
A) Do it. So long as she pays her parents back right away, it should be all right.
B) Don't. Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
Computers and Technology
1 answer:
Artyom0805 [142]3 years ago
6 0

Answer:

1. Option B

2. Option B

3. Option B

Explanation:

Your mother's maiden name might be a password recovery question for your other personal account.

It is not legal to provide your SSN to any private entity.

Since the authenticity of the web site cannot be verified, it is not advisable to have business transactions with such websites.

You might be interested in
In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be cu
Paraphin [41]

Answer:

industry politics

Explanation:

In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.

This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.

Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.

6 0
3 years ago
Routers do not forward broadcast packets.A. TrueB. False
mestny [16]
The answer you’re looking for is false
5 0
3 years ago
How can learning opportunities for AI be extended to all
statuscvo [17]

Answer:

Learning opportunities for AI can be extended to all through the inclussion of courses and different teaching methods related to Artificial Intelligence, new technologies, computer science, programming and, in short, everything related to the digital world, in the educational plans at the national level. This is so because artificial intelligence and computer systems are the basis for the development of the new tools jobs of tomorrow. Thus, education in these subjects is essential so that citizens can enter the labor market once they acquire the necessary age, having the knowledge to do so in a proper way.

6 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
Other questions:
  • A Write about why it is important for a person to upgrade their job skills
    14·1 answer
  • A _____ is an employment test that evaluates your specific job-related abilities, such as typing speed. It is recommended that y
    6·2 answers
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Which is an internet service?<br><br> Antivirus<br> Chat<br> Firewall<br> Router
    8·2 answers
  • 2.8 Code Practice: Question 2
    11·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • Technology changes rapidly. Do you think the development of new technology will slow down at some point? At some point will cons
    12·1 answer
  • Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers Thi
    6·1 answer
  • When a company sends you recommendations of what to buy you know that :
    12·1 answer
  • Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!