1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
15

The three of hazards​

Computers and Technology
1 answer:
Paul [167]3 years ago
6 0

Answer:

Please be more specific

Explanation:I take digital technology information so I might be able to help you.

You might be interested in
Computer gets bored very easily
Gelneren [198K]

Answer:

that is very interesting

Explanation:

5 0
2 years ago
Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
Aleks [24]

Answer:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Explanation:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Some measures to be taken by both the banks and the customers are as follows;

  • The customers should be careful not to call any number people send to them rather they should get any information they need by going to the bank or search for such information on the bank official websites.
  • Customers should be alert and think carefully before sharing any financial details
  • For customers that responded to such messages, the banks will be proactive enough to shut it down and retrieve the customer's funds the same day.
  • Customers are advised to always report such fraudulent messages when received.
  • Banks should frequently verify transactions through telephone or text messages whenever an unusually high or out of the ordinary payments are flagged by its automated systems.
  • The bank can also prevent this fraud by blocking the customer card whenever an unusual transaction is noticed. The customer will then be contacted to confirm if the transaction was genuine or not. At times the transaction may need to be attempted again.

6 0
3 years ago
Identify one or more negative and positive impacts of electricity.
shepuryov [24]

Answer:

positive results is the use of light to see

negative results is high power supply cause burning of things and make houses to burn

Explanation:

pls make me ur brainliest

5 0
3 years ago
____ is a systems development technique that produces a graphical representation of a concept or process that systems developers
rosijanka [135]

Answer:

D. Modeling

Explanation:

<em>Modeling</em>: It is a graphical representation, of a concept or system, technique used by software developer to analyze, test, and modify that system or concept.

4 0
4 years ago
True or False: A combination of a solid yellow and a broken yellow line means that you can pass only on the side that has the br
amid [387]
True, because the broken line gives you the ability to cross and pass, with the solid line you are not allowed to pass.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Why don't we get together to watch the Academy Awards?
    15·2 answers
  • 1.
    6·1 answer
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • Which best describes the condition under which the Unicode output is the same as plain text?
    7·1 answer
  • Which of the following is a benefit of using a parallel circuit system?
    12·1 answer
  • Use the drop-down tool to match each definition to the correct word or phrase. The computer that responds to requests from the c
    15·1 answer
  • OH GOD PLEASE HELP I CAN'T FIGURE THIS OUT-
    6·1 answer
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • Downlad the file and write a program named Lab10b_Act2.py that does the following: Opens the CSV file for reading Reads the CSV
    15·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!