1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
2 years ago
11

Which technology is predominately used for contactless payment systems?

Computers and Technology
1 answer:
kompoz [17]2 years ago
7 0
The correct answer for this question is this one: "a. wireless local area network (WLAN)."

<span>The technology that is predominately used for contactless payment systems is called the </span><u>wireless local area network (WLAN)</u><u />. It is even used now a days.
Hope this helps answer your question and have a nice day ahead.
You might be interested in
_____ is an example of a locally installed email client.
levacccp [35]
Gmail is an example of a locally installed email client
6 0
3 years ago
Read 2 more answers
What type of desktop system is Sarah using in the following scenario? Sarah types the phrase “Open Document 3” onto a black scre
Vedmedyk [2.9K]

I'd go with command-line interface.

A CLI enables users to type commands in a console or a terminal window expressed as a sequence of characters and presses the enter key on the keyboard to execute that command. And in this case, Sarah is typing an “open document 3” command to the command-line interface to open a file in her computer.

4 0
3 years ago
What is the Multiple Items tool?
Dmitry_Shevchenko [17]

Explanation:

when a form is created in Microsoft Access using the form tool it displays a single record at a time.To display multiple records and the form should be more customizable then in this case we use Multiple Items tool.

Creating a form using Multiple Items Tool:-

In navigation pane click query or table which contains the data that we want to see on the form.

On create tab,in the group Forms,click more Forms,then click Multiple Items.

6 0
3 years ago
Which app is used to synchronize data among iOS devices and Windows desktops?
docker41 [41]
ICloud because it links your old device to the new one
4 0
3 years ago
Read 2 more answers
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
Other questions:
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additiona
    9·1 answer
  • 11)When, if ever, will the geometric average return exceed the arithmetic average return for a given set of returns?A) When the
    6·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Q: Why can't I log in to Brainly
    13·1 answer
  • Work-based learning can be defined as educational experiences that focus on
    6·1 answer
  • Computer in education are used for teaching and learning aids​
    14·1 answer
  • How to transfer polygon from eth to polygon in ledger live
    6·1 answer
  • Help fast pls
    6·1 answer
  • Compared to using a command line, an advantage to using an operating system that employs a gui is ________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!