1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
15

1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is

also asked to enter his nick name, the names of any pets, and his mom's maiden name. Should he do it?
A) Do it. The questions are silly, but it's worth it to win $10,000.
B) Don't. Identity thieves use such "clues" to figure out people's passwords.
2. Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security Number (SSN) right away or he will lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
A) Do it. It's an official notice from a company and if he waits, he could lose everything.
B) Don't. Real companies don't do this. Thieves use such information to create false identities.
3. Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
A) Do it. So long as she pays her parents back right away, it should be all right.
B) Don't. Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
Computers and Technology
1 answer:
Artyom0805 [142]3 years ago
6 0

Answer:

1. Option B

2. Option B

3. Option B

Explanation:

Your mother's maiden name might be a password recovery question for your other personal account.

It is not legal to provide your SSN to any private entity.

Since the authenticity of the web site cannot be verified, it is not advisable to have business transactions with such websites.

You might be interested in
The Joint Photographic Experts Group developed the ___________ graphic format.
jolli1 [7]
1. <span>The Joint Photographic Experts Group developed the jpeg graphic format. 
2. </span><span>It is important to include the alt attribute of the tag because some people use text-only Web browsers. </span>
4 0
3 years ago
Read 2 more answers
the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
marta [7]
A. the modem provides the wifi or internet to the computer
6 0
3 years ago
Read 2 more answers
Objectives ** WILL GIVE BRAINIST PLEASE**
mamaluj [8]

Answer:

of which std this question is

8 0
3 years ago
Read 2 more answers
How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connect
AleksandrR [38]

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

<u>Explanation:</u>

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

8 0
3 years ago
Which of the following that can be use read cookies in PHP?
iris [78.8K]

Answer:

a. $_COOKIE

Explanation:

$_COOKIE represents an associative array of Cookie name and value in PHP. For example in the code below we use the $_COOKIE construct to read the value of a cookie called 'testcookie' provided it has already been set.

<html>

<body>

<?php

if(!isset($_COOKIE["testcookie"])) {

   echo "Cookie 'testcookie' is not defined!";

} else {

   echo "Value of 'testcookie' is: " . $_COOKIE["testcookie"];

}

?>

</body>

</html>

8 0
4 years ago
Other questions:
  • A compound document contains _______ from different applications.
    12·2 answers
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • Assume that the following code exists inside a method of SomeClass, and that this code compiles without errors:
    13·1 answer
  • Investments in data networks, ip addresses, routers, and switches are ________ because of their impact on productivity, security
    14·1 answer
  • Explain about forensic tools?
    14·1 answer
  • Write a procedure ConvertToBinary that takes an input as a number from 0 to 16 (including 0 but not 16) and converts it to a bin
    11·1 answer
  • What is the principal goal of data science?<br>​
    5·1 answer
  • Help fast plzzzzzzzzzzzz ​
    10·2 answers
  • you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on
    13·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!