1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
12

Can someone please help me with this question?

Computers and Technology
1 answer:
madreJ [45]3 years ago
5 0
I would use a biometric machine that scans a fingerprint and a eye retina then calls up my bank information from the scan. Who wants to carry a card around anyway?
You might be interested in
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Draw a flowchart to convert 5 kg into gram .​
dlinn [17]

Answer:

Kg to g, multiply by 1000

Therefore, 5 Kg = 5000 gms

Explanation:

5 0
3 years ago
Read 2 more answers
A .jpg file is an example is an example of which if the following file types
Setler79 [48]
Answer chooses would help but a .jpg is a picture
4 0
3 years ago
Styles are selected using the _____ tab. file home insert page layout
MrMuchimi
It is using the page layout for page styles, home for title/word styles

6 0
4 years ago
Read 2 more answers
Hlo friends <br>what is full form of KEYBOARD ​
Vladimir79 [104]

<em>keys Electronic Yet Board Operating A to z Response Directly.</em>

8 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it that even though there aren't the max number of answers on a question, (or sometimes even NO answers) When I click the
    11·1 answer
  • What is meant ny backing up files through cloud computing
    13·2 answers
  • What command will disable dns lookup to prevent the router from attempting to translate incorrectly entered commands as though t
    6·1 answer
  • Write the code to call a function named send_variable and that expects a single int parameter. Suppose a variable called x refer
    6·1 answer
  • How are people using lying today? What are the types of lying? Describe each type.
    7·1 answer
  • The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is st
    8·1 answer
  • Theresa is not sure how nondestructive editing can be helpful in her project. Which of these is accurate about nondestructive ed
    8·1 answer
  • What type of data causes concern for institutions or business when collected, stored, and not secured properly
    6·1 answer
  • write a program that computes an integer's checksum. to compute the checksum, break the integer into its constituent
    11·1 answer
  • Int r=6;<br> int v=20;<br> System.out.println( r % v );
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!