1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
11

List three ways security could be improved for taking the prepared deposit monies to the bank?​

Computers and Technology
1 answer:
cluponka [151]3 years ago
6 0

Answer:

Facial recognition

Iris Recognition (more secure than facial recognition)

longer pins

AES-256 encryption

Explanation:

ultimately our society today is using less cash then plastic as plastic becomes more efficient than carrying cash, although the trade-offs are security and lack of encryption. cards are so easy to hack that little kids have been taught how to clone credit and debit cards.

You might be interested in
Why crt and plasma are not used in laptop ?​
AlekseyPX

Answer:

Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.

Explanation: pls mark my answer as brainlist

6 0
3 years ago
What else needs to be done when creating a site?
SSSSS [86.1K]
When you are creating a website, you will usually need to add details to the website. If you're coding a website as HTML, you always have to make sure your code is correct. If one thing is a mess up, you have to start the whole thing all over again. 
5 0
3 years ago
Holly created a professional development plan to explore how she could advance from her entry-level position to the next step in
Sunny_sXe [5.5K]
A.) Ask a colleague for advice work life balance
3 0
3 years ago
Read 2 more answers
Which of the following is not true of both the ACT and the SAT?
nlexa [21]
The answer for that is c
6 0
4 years ago
Read 2 more answers
For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
Vlada [557]

Answer:

1. E.eid ,E.hobby, E.sal, E.did

2.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

3.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

4.E.eid , D.dname

Explanation:

The attributes that are examined for the query are the attributes of the table that are mentioned in the select statement and where clause.

So according to first query we are working on all attribues of Emp table so all of the attributes of Emp table are examined.In second query we selecting all attributes of both the tables hence all attributes of both the table and same in the next query.

In fourth query though the query is not complete where clause is missing but we have eid from Emp and dname from Dept tables for sure and the attributes mentioned in where clause will also be present.

7 0
3 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • In order to install a device, the operating system needs the required __________ for that device.
    15·2 answers
  • What type of simple machine is a steel bolt?
    9·1 answer
  • Twitter and facebook are both examples of the​ _____________ internet business model.
    7·1 answer
  • Does anyone know what type of Honda this is and the year of it lol this isn’t school related
    10·1 answer
  • Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which
    11·1 answer
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • Cuantos puntos de habilidad se puede tener en clubes pro?
    9·1 answer
  • Can I control my digital footprint?
    9·2 answers
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!