1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
8

How do you know if you get a phone call that is a scam

Computers and Technology
2 answers:
slava [35]3 years ago
8 0
Most scam calls ask for your personal information or try to persuade you that they have something for you. Sometimes the name “scam” will show up on your cellphone when a scammer is calling. On the other hand, download the app Truecaller which identifies where the caller is calling from and wether the caller is a scammer. All in all, never reveal your personal info to people you don’t know and stay safe! Hope this helped :))
Kamila [148]3 years ago
5 0

It might have a really weird phone number, also if it sounds like its too good to be true it probably is. Good luck, and don't fall for scams!! XD

You might be interested in
Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a pr
klio [65]

Answer:

See the code snippet below

Explanation:

import java.util.Scanner;

public class LabProgram{

     public static void main(String[] args){

          Scanner scan = new Scanner(System.in);

          System.out.println("Please enter first number: ");

          int firstNumber = scan.nextInt();

          System.out.println("Please enter second number: ");

          int secondNumber = scan.nextInt();

          maxMagnitude(firstNumber, secondNumber);

}

     public static int maxMagnitude(int firstValue, secondValue){

         System.out.println(Math.max(firstValue, secondValue));

}

}

6 0
3 years ago
can any one tell me the difference between the things showed in the circle i will mark brainiest to the first one
Shalnov [3]

Answer:

The different brainly websites are different because they are associated with different countries. Each country has their own network and internet rules, and Brainly has to comply with each countries rules. Each country gets their own Brainly site. So, Brainly.com is for the US, Brainly.pl is for Poland, etc.

Explanation:

3 0
3 years ago
OH NO THE HEAVY IS DEAD
Anarel [89]

Answer:

what does that mean?

are you okay?

Did something happen?

4 0
3 years ago
Read 2 more answers
ZigBee is an 802.15.4 specification intended to be simpler to implement, and to operate at lower data rates over unlicensed freq
never [62]

Answer:

True

Explanation:

Solution

ZigBee uses unlicensed frequency bands but operate at slower speed or data rates.

ZigBee: This communication is particular designed for control and sensor networks on IEEE 802.15.4 requirement for wireless personal area networks (WPANs), and it is a outcome from Zigbee alliance.

This communication level defines physical and  (MAC) which is refereed to as the Media Access Control layers to manage many devices at low-data rates.

6 0
3 years ago
What is ""quality""?
Naddik [55]

Answer: Quality is the parameter which describes about the distinctive trait  presented by something.The measurement of the quality is based on whether or not the substance is able to fulfill the requirement of the client.

In respect with the computing field ,quality is the characteristic that is supposed to be good if there is presence of no defects or damage and is able to meet the requirement of the user or client. This parameter can be for devices, programming languages, software etc.

7 0
3 years ago
Other questions:
  • 2. Statement: "I don't agree with you." Nonverbal gesture: Type of gesture:
    6·1 answer
  • What is output? <br> Print (12 % 5)<br><br> Answer <br> 0<br> 5<br> 2<br> 1
    12·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • I have a summary to write for my robotics class but it is way too hard and i have a bery less time. If you can help me it would
    7·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
  • Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the u
    15·1 answer
  • in ____ structures, the computer repeats particular statements a certain number of times depending on some condition(s).
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!