1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
3 years ago
11

Mobile phones that function as credit cards are called _____.

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
7 0
The answer is A- Mobile Wallet
It can be used to pay for your purchases instead of using your actual card. It may be an app or it may be already built into the device. It is actually more convenient to others because you can just hold your device at the terminal when you will pay. Mobile Wallets may be smartphones or tablets.
You might be interested in
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
pychu [463]

Answer:

ADMINISTRATIVE CONTROL

Explanation:

If a potential employee is required to undergo a drug screening an Administrative Control is what will be conducted on the employee because

Administrative controls are training, procedure, policy that limit or prevent exposure of an individual to hazards. Examples of administrative controls include training, supervision, timing of work. Administrative controls are also changes in work procedures such as written safety policies, rules, supervision which is the reason the employee has to undergo drug screening using Administrative controls.

6 0
3 years ago
How does a MIPS Assembly procedure return to the caller? (you only need to write a single .text instruction).
AnnyKZ [126]

Answer:

A MIPS Assembly procedure return to the caller by having the caller pass an output pointer (to an already-allocated array).

8 0
3 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
3 years ago
Which is an acceptable practice when a photographer shoots in windy conditions?
VARVARA [1.3K]

Answer:

d) attach a bag of weights to the tripod

Explanation:

5 0
3 years ago
What could cause this? An App Builder wants to show Groups as the last navigation menu item in the Salesforce1 Mobile App. Howev
sasho [114]

Answer:

Option B is the correct option.

Explanation:

In the above scenario, When they wanted to demonstrate Groups as the last menu item for navigation in the Mobile App. Then, they can't select Groups as among the elements in the drop-down menu though.

So, the following scenario causes that the Groups are not contained in the selected list for the navigation menu.

4 0
3 years ago
Other questions:
  • Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
    8·2 answers
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • The United States is the only country in the world in which organs and tissue transplants are performed. True or False?
    8·1 answer
  • An Einstein Analytics team wants to create a dashboard that displays values from an external, on-premise Oracle Database. What a
    7·1 answer
  • In the Application, "The Effect of FDI on Rentals and Wages in Singapore," the annual growth rate in real rental rates for the 1
    5·1 answer
  • Write a program that receives an character and displays its Unicode. Here is a sample run: Enter an character: E The Unicode for
    8·1 answer
  • Write a while loop that adds the first 100 numbers (from 1 to 100) together. To do so, use a while loop that continues while the
    12·2 answers
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • What is the name of the arm that is attached to the read/write head?
    13·1 answer
  • write a program that prompts the user to input the length of a string as an integer, followed by the string and outputs the stri
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!