1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
7

What is the most important thing you should avoid files and folders?

Computers and Technology
1 answer:
Makovka662 [10]3 years ago
6 0
Passwords!!!!!!!!!!!
You might be interested in
The ____ loop can be used to process each element of an array.?
salantis [7]
The "For each" loop can be used to process each element of an array.?
4 0
3 years ago
When you are using the internet to research a school project, and you ignore the banner ads on websites even though you see them
FinnZ [79.3K]

Answer:

The answer is "selective exposure".

Explanation:

It is a theory in psychology, that is sometimes used in marketing and advertising studies. It traditionally applies to the propensity of people to prefer evidence, that enhances existing previous views while ignoring conflicting information.

These types of approaches are occurring, when the people pursue knowledge and consistently express desires for solutions, that are associated with their beliefs, rather than incompatible.

5 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. U
Paul [167]
They describe the adven
8 0
3 years ago
How do you get your winkey wet??
Lynna [10]

Answer:

what

Explanation:

what

sorry but what

7 0
2 years ago
Read 2 more answers
Other questions:
  • DG Loans, a mortgage lender, was charged with a discrimination lawsuit. It alleged that the company was offering loans at higher
    13·1 answer
  • Which of the following is a Web browser? Exit Test A Windows B Comcast High-Speed C Microsoft Internet Explorer D Modem
    7·1 answer
  • How to jail break iphone 7 with <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="7617023602">[email&#160
    11·2 answers
  • The main activity area or the brain of the computer is called the ________
    15·1 answer
  • The central device on a network that provides a common connection point for nodes on that network is called the
    8·1 answer
  • You just installed a new application but users cannot connect to the application remotely. Which feature should be checked to en
    14·1 answer
  • 2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
    15·2 answers
  • A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u
    12·1 answer
  • Java: which expression is evaluated first
    13·1 answer
  • How to add links in HTML? ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!