1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
15

1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is

also asked to enter his nick name, the names of any pets, and his mom's maiden name. Should he do it?
A) Do it. The questions are silly, but it's worth it to win $10,000.
B) Don't. Identity thieves use such "clues" to figure out people's passwords.
2. Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security Number (SSN) right away or he will lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
A) Do it. It's an official notice from a company and if he waits, he could lose everything.
B) Don't. Real companies don't do this. Thieves use such information to create false identities.
3. Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
A) Do it. So long as she pays her parents back right away, it should be all right.
B) Don't. Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
Computers and Technology
1 answer:
Artyom0805 [142]3 years ago
6 0

Answer:

1. Option B

2. Option B

3. Option B

Explanation:

Your mother's maiden name might be a password recovery question for your other personal account.

It is not legal to provide your SSN to any private entity.

Since the authenticity of the web site cannot be verified, it is not advisable to have business transactions with such websites.

You might be interested in
The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and
enyata [817]

Answer: Limits the row data that are returned.

Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.

For instance,

FROM * SELECT table_name WHERE username = 'fichoh' ;

The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.

3 0
3 years ago
During spring in Colorado, ice on the mountain tops melts into water. Some of this water gets trapped in cracks in the mountain
zlopas [31]
Physical weather. It isn't changing the the chemical or biological make up.
3 0
3 years ago
Read 3 more answers
Education leads to higher wages lower unemployment.* True or false
natta225 [31]

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

5 0
3 years ago
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio
serg [7]

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

5 0
3 years ago
To securely erase data, the u.s. department of defense suggests that the data be overwritten ________ times.
Stels [109]
The course that will tackle this topic is computers and technology. The answer to the given problem above is "7".

To securely erase date, the United States department of defense suggest and propose that the data can be overwritten 7 times.
4 0
3 years ago
Other questions:
  • On hearing my name, you may think that I am iterative, but I play a vital role in networking by boosting the signal strength to
    13·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
    10·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • Your customer, Maggie, wants to buy a gaming PC, and she specifically mentions that she wants an Intel CPU and intends to overcl
    10·1 answer
  • What is one advantage of using object-oriented programming?
    14·2 answers
  • Yall tryna play gta later? I play on ps4
    12·2 answers
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Basics of visual basic
    15·2 answers
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!