1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
8

Where could a identey theft have access to your social security number

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
6 0
The internet when using not safe websites
You might be interested in
Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
Inga [223]

Answer:

C. <loc>

Explanation:

We need to mention the below details:

  • location
  • changed frequency
  • last changed
  • priority of page

We have the XML file for a sitemap, and we need to enter the above details for each of the Url. We need to enter the location, last changed, changed frequency and priority of the page for each of the URLs. And the URL of the home page is surrounded by the Loc tag. And hence, the correct option for this post is the C.<Loc> option.

8 0
3 years ago
Which name is given to an architectural framework for delivering ip multimedia services?
jonny [76]
IP Multimedia Subsystem<span> or </span>IP Multimedia<span> Core Network </span>Subsystem<span> (</span>IMS) is the term that refers and describes<span> an architectural framework for delivering IP multimedia services.
</span>IMS is a standards-based architectural framework <span> defined by the 3rd Generation Partnership Project (3GPP) </span>for delivering multimedia<span> communications </span>services such as voice, video and text .
6 0
4 years ago
Components that enhance the computing experience, such as computer keyboards, speakers, and webcams, are known as
never [62]

Answer:

- Peripheral devices

Explanation:

Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.

3 0
4 years ago
Photo editing software, desktop publishing, email and word processing software is most likely to be used by:
FrozenT [24]

Answer:

c) mass media personnel

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. System softwares.

II. Utility softwares.

Photo editing software, desktop publishing, email and word processing software is most likely to be used by a mass media personnel because he or she deals with the creation of various documents such as images, texts, multimedia files etc.

4 0
3 years ago
In c++
Elodia [21]

Answer:

class studentType: public personType

{

public:

virtual void print() = 0;

virtual void calculateGPA() = 0;

void setID(long id) {

studentId = id;

}

void setCourses(const string c[], int noOfC) {

noOfCourses = noOfC;

for (int i=0; i<noOfCourses; i++) {

courses[i] = c[i];

}

}

void setGrades(const char cG[], int noOfC) {

noOfCourses = noOfC;

for (int i=0; i<noOfCourses; i++) {

coursesGrade[i] = cG[i];

}

}

long getID() {

return studentId;

}

string* getCourses() {

return courses;

}

char* getGrades() {

return coursesGrade;

}

studentType(string fName = "", string lastName = "",

long id = 0, string c[] = NULL, char cG[] = NULL, int noOfC = 0);

private:

long studentId;

string courses[6];

char coursesGrade[6];

int noOfCourses;

};

Explanation:

Code rewritten

5 0
3 years ago
Other questions:
  • Dynamically allocatе mеmory for a DNA objеct and storе its addrеss in a variablе namеd dnaPtr
    11·1 answer
  • Imagine the user types in a complete sentence, but we want to read only the first word and place it in the String variable word.
    11·1 answer
  • Is your florida learners license number the same as the actual license number?
    14·2 answers
  • Which of the following technologies is the best choice to convey urgent and highly sensitive information?a. Telephone b. Fax Let
    12·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • Dave has to create animations for a game. Which tool can Dave use?
    6·1 answer
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • Listed here are a few camera angles and their images.
    10·1 answer
  • Multiple choice:
    12·2 answers
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!