1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
10

If you must apply for a loan, you should _____. contact a broker and provide certain loan information visit a loan officer at a

financial institution and complete an application call your credit card company and answer questions over the phone run a credit report and send it to a loan officer
Computers and Technology
2 answers:
azamat3 years ago
4 0
B.) V<span>isit a loan officer at a financial institution and complete an application.</span>
Veronika [31]3 years ago
3 0
<span>Visit a loan officer at a financial institution and complete an application.</span>
You might be interested in
One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business fun
stealth61 [152]

Answer:

collaboration diagram

Explanation:

Collaboration diagram -

It refers to the diagram , which showcase the link between the unified modeling language with the software object , is referred to as the collaboration diagram.

It is also called the communication diagram .

These diagram are very important for a company as it is the  pictorial representation.

Various software are used to make these diagrams.

5 0
3 years ago
which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
Ratling [72]

The statements that are true regarding incoming and outgoing interfaces in firewall policies are:

  • A zone can be chosen as the outgoing interface.
  • -Multiple interfaces can be selected as incoming and outgoing interfaces.

<h3>What is a firewall?</h3>

A firewall is a network security device used in computing that monitors and regulates incoming and outgoing network traffic in accordance with pre-established security rules. Typically, a firewall creates a wall between a trustworthy network and an unreliable network, like the Internet.

A firewall aids in defending your network from intruders. A firewall protects your network by operating as a continuous filter that constantly scans incoming data and blocks anything that appears to be suspicious.

Therefore, the statements that are true regarding incoming and outgoing interfaces in firewall policies are:

A zone can be chosen as the outgoing interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

Learn more about firewall on:

brainly.com/question/13693641

#SPJ1

Which statements are true regarding incoming and outgoing interfaces in firewall policies? (Choose two.)

Select one or more:

-An incoming interface is mandatory in a firewall policy, but an outgoing interface is optional.

-A zone can be chosen as the outgoing interface.

-Only the any interface can be chosen as an incoming interface.

-Multiple interfaces can be selected as incoming and outgoing interfaces.

4 0
2 years ago
Choose all that apply.
kirill115 [55]

Answer:

Bullets can be turned off and on.

Lists don't have to use numbers or bullets.

Explanation:

because L just wanted the light

6 0
3 years ago
Read 2 more answers
What is a dynamic CMOS circuit?
dybincka [34]

Answer:

Dynamic circuit class, which relies on temporary storage of signal values on the capacitance of high- impedance circuit nodes. In this section, an alternate logic style called dynamic logic is presented that obtains a similar result, while avoiding static power consumption.

Explanation:

Please Mark me brainliest

6 0
3 years ago
What does spyware do on your computer?
faust18 [17]
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owners private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. if this helps any....
6 0
3 years ago
Other questions:
  • In what stage of writing does publishing occur
    14·1 answer
  • Which is better to use for cleaning electronics, Ethyl alcohol vs isopropyl alcohol?
    14·1 answer
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • Place the following discoverers in the correct chronological order of the timeframe for their discoveries, from earliest to most
    5·1 answer
  • A thesaurus can be used to look up a (n) or word similar in meaning to a given word
    15·1 answer
  • Instructions:Select the correct answer.
    6·2 answers
  • federal law requires public libraries to install filtering software on computers to prevent children from accessing adult conten
    14·1 answer
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • What do you understand by the term input, output, processing and storage.​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!