1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
15

Will a debit card still work if i put stickers on it?

Computers and Technology
2 answers:
laiz [17]3 years ago
8 0

Answer:

Explanation:

Yes, it may still be readable, but if they refuse to take it you have no ground to stand on. (If you obscure the signature, at least make sure the CVV is readable or reprinted on top.) The plastic covering should not interfere with the mag stripe.

Levart [38]3 years ago
7 0
The plastic covering should not interfere with the mag stripe. In fact, cashiers have been known to use plastic (How Does a Plastic Bag Fix a Buggy Credit Card?) to fix finicky cards.

BUT, you technically cannot cover the signature. While it will still scan, if the cashier cannot see your signature and the CVV number on the back without obstruction, they may not be willing/able to take the card. Yes, it may still be readable, but if they refuse to take it you have no ground to stand on. (If you obscure the signature, at least make sure the CVV is readable or reprinted on top.)
You might be interested in
"The Cloud " is: A A form of word processing B A network for accessing applications from any device C A virtual gaming environme
mestny [16]
I think the answer may be B
7 0
3 years ago
Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a
kirill115 [55]

Answer:

Check the explanation

Explanation:

CPI means Clock cycle per Instruction

given Clock rate 600 MHz then clock time is Cー 1.67nSec clockrate 600M

Execution time is given by following Formula.

Execution Time(CPU time) = CPI*Instruction Count * clock time = \frac{CPI*Instruction Count}{ClockRate}

a)

for system A CPU time is 1.3 * 100, 000 600 106

= 216.67 micro sec.

b)

for system B CPU time is =\frac{2.5*100,000}{750*10^6}

= 333.33 micro sec

c) Since the system B is slower than system A, So the system A executes the given program in less time

Hence take CPU execution time of system B as CPU time of System A.

therefore

216.67 micro = =\frac{2.5*Instruction}{750*10^6}

Instructions = 216.67*750/2.5

= 65001

hence 65001 instruction are needed for executing program By system B. to complete the program as fast as system A

3 0
3 years ago
Define a class named Doctor whose objects are records for a clinic’s doctors. Derive this class from the class Person given in L
pashok25 [27]

Answer:

Following is defined the required class having accessor methods and test program:

Explanation:

class Person

{

private String doc_name;

public Person(String doc_name)

{

this.doc_name = doc_name;

}

public String getDoc_Name()

{

return doc_name;

}

}

class Doctor extends Person

{

private double office_visit_fee;

private String Specialty;

public Doctor(String doc_name,double office_visit_fee,String Specialty)

{

super(doc_name);

this.office_visit_fee = office_visit_fee;

this.Specialty = Specialty;

}

//accessor methods

public double getOffice_Visit_Fee()

{

return office_visit_fee;

}

public String getSpecialty()

{

return Specialty;

}

public String toString()

{

return "Doctor Name "+getDoc_Name()+" Office Visit Fee :$"+office_visit_fee+

" Specialty : "+Specialty;

}

}

class Test

{

public static void main (String[] args)

{

 Doctor dctr = new Doctor("Joseph Lister",134.56,"Obstetrician");

 System.out.println(dctr);

}

}

Output:

Doctor Name Joseph Lister Office Visit Fee :$134.56 Speciality : Obstetrician

6 0
3 years ago
Which list method allows elements in a sequence to be removed and added at either end of the structure?
ki77a [65]

Answer:

c.) stack

Explanation:

8 0
3 years ago
Should video gaming be considered a school sport?
irinina [24]

Answer:

I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which Command Prompt commands in Windows is used for listing a computer connections to shared resources
    10·1 answer
  • Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than hav
    7·1 answer
  • What are the different components of the cloud architecture? The of the cloud architecture is the cloud, which is a collection o
    11·1 answer
  • I have gtx880m Alienware 18.4” no video how do I repaste the chip
    7·1 answer
  • Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, ma
    13·1 answer
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • Which of the following is not a SQL*Loader file?
    11·1 answer
  • 1. Consider a database with object X and Y and assume that there are two transactions T1 and T2. Transaction T1 reads objects X
    5·1 answer
  • Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
    7·1 answer
  • Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number an
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!