1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
5

what is the ability to carry out financial transactions using mobile devices such as tablets and phones?

Computers and Technology
1 answer:
scZoUnD [109]3 years ago
4 0
Mobile banking is the ability of making financial transactions on a mobile device (cell phone, tablet, etc.) anytime, anywhere.<span>The disadvantage for this kind of activity is the security concerns. Creating</span> a secure connection is important or else a client might risk his personal information being jeopardized.
You might be interested in
Can anyone please help me out
Sidana [21]

Answer:

No se ve nada

3 0
3 years ago
What are the elements of an autobiographical narrative similar to those of a short story?
sattari [20]
A. because the form is about stories from events in a writer's life
6 0
3 years ago
Look at the following Python code:
aliya0001 [1]

Ump will be assigned to word2

word1[0:3] gets all of the letters from index 0 to index 3 exclusive (that means index 3 is not included)

4 0
3 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
3 years ago
a. Describe how the student can use the jar of rice to model particle motion of a substance in each state of matter: solid, liqu
Black_prince [1.1K]

Answer:

because the jar is ........

4 0
3 years ago
Other questions:
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • Which tool can you use in spreadsheet software to display only specific data values?
    9·1 answer
  • What is the easiest way to create a resume in Word with predefined content that can be replaced with your information?
    13·2 answers
  • It is a small hand tool used generally in decorative works such as making garnishes
    15·1 answer
  • Which osi/iso layer is responsible for determining the best route for data to be transferred?
    5·1 answer
  • Which of the following best describes professional behavior in the IT field?
    6·1 answer
  • How should tools be stored <br>​
    13·1 answer
  • State five differences between Dos and Windows.​
    14·1 answer
  • A trace table is used for
    5·2 answers
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!