1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
15

1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is

also asked to enter his nick name, the names of any pets, and his mom's maiden name. Should he do it?
A) Do it. The questions are silly, but it's worth it to win $10,000.
B) Don't. Identity thieves use such "clues" to figure out people's passwords.
2. Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security Number (SSN) right away or he will lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
A) Do it. It's an official notice from a company and if he waits, he could lose everything.
B) Don't. Real companies don't do this. Thieves use such information to create false identities.
3. Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
A) Do it. So long as she pays her parents back right away, it should be all right.
B) Don't. Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
Computers and Technology
1 answer:
Artyom0805 [142]3 years ago
6 0

Answer:

1. Option B

2. Option B

3. Option B

Explanation:

Your mother's maiden name might be a password recovery question for your other personal account.

It is not legal to provide your SSN to any private entity.

Since the authenticity of the web site cannot be verified, it is not advisable to have business transactions with such websites.

You might be interested in
What is a characteristic ofa good cloud-based hosting?
Aliun [14]

Answer:

Explanation:

A good cloud-based hosting has many beneficial characteristics, some of which include on-demand self-service, broad network access, and being very elastic and scalable. These characteristics allow for a large number of users to benefit from the service at any time of the day and at a very fast speed due to the broad network access.

6 0
3 years ago
Assume the following variable definition appears in a program:
AnnZ [28]

Answer:

cout << setprecision(2)<< fixed << number;

Explanation:

The above statement returns 12.35 as output

Though, the statement can be split to multiple statements; but the question requires the use of a cout statement.

The statement starts by setting precision to 2 using setprecision(2)

This is immediately followed by the fixed manipulator;

The essence of the fixed manipulator is to ensure that the number returns 2 digits after the decimal point;

Using only setprecision(2) in the cout statement will on return the 2 digits (12) before the decimal point.

The fixed manipulator is then followed by the variable to be printed.

See code snippet below

<em>#include <iostream>  </em>

<em>#include <iomanip> </em>

<em>using namespace std;  </em>

<em>int main()  </em>

<em>{  </em>

<em> // Initializing the double value</em>

<em> double number = 12.3456;  </em>

<em> //Print  result</em>

<em> cout << setprecision(2)<< fixed << number;  </em>

<em> return 0;  </em>

<em>}  </em>

<em />

4 0
3 years ago
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
Which are three possible text formatting actions in wordpad?
DaniilM [7]

Answer:

Font, Bold, italic, colored, centered text...

7 0
3 years ago
The fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in t
AVprozaik [17]

Answer:

<div></div>

Explanation:

The <div></div> tag allows you to build containers to the text that you want to include in your html

6 0
3 years ago
Read 2 more answers
Other questions:
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • What two different passwords can be set to lock down a computer from unauthorized access?
    13·1 answer
  • Technician A says that the engine block is the solid frame from which all automotive and truck engines are constructed and is ma
    10·2 answers
  • Which is the hanging indent on the ruler?
    10·2 answers
  • write the program or pseudocode algorithm that computes the product and average of three integers and display the results​
    7·1 answer
  • Python is an example of a low level programming language true or false?​
    14·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • How to make a message appear in more than one slack channel
    9·1 answer
  • When viewing an e-book section of an assignment in launchpad, you can return to your main course page at any time by clicking th
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!