1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
10

When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.

Computers and Technology
2 answers:
vaieri [72.5K]3 years ago
8 0
Correct, debit cards use money you already have. Credit cards basically 'loan' money, which can lead to debt if you overuse it or fail to pay it off
asambeis [7]3 years ago
6 0

Answer:

True

Explanation:

Debit cards are plastic cards similar to a credit card, they are used for payment of goods and services over the internet and the money is been debited directly from the bank account attached to the debit card. in other words it is used to electronically transfer cash from a bank account by the holder of the card. while shopping with your debit card the worth of the goods been bought is paid for directly from your bank account which means that you can only make payments within your current bank account balance.

while in credit card useage you are allowed to make payments above your current bank account balance i.e charges you in line of your credit worth hence throwing you into debit.

You might be interested in
Software that function as an electronic file cabinet
Airida [17]

Answer:

The answer to this question is "Document management software".

Explanation:

Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.

  • This software controls many fields, that are Storage location, Security and access control, Version control, etc.
  • It is a common component, that is found in an Enterprise Content Management environment, that uses this software.

7 0
3 years ago
in a block in a blockchain what represents the transactional data, sender, receiver, and number of coins? group of answer choice
erastova [34]

In a block in a blockchain, a resource which represent the transactional data, sender, receiver, and number of coins is: A. data.

<h3>What is a blockchain?</h3>

A blockchain can be defined as a digital and dynamic financial system that is designed and developed to be used in recording and maintaining transactions that are associated with or made through the use of a bitcoin, usually as a database containing various set of data.

In this context, we can infer and logically deduce that data is a resource that typically represent all of the transactional data, sender, recipient (receiver), and the number of bitcoins in a block in a blockchain.

Read more on blockchain here: brainly.com/question/25700270

#SPJ1

6 0
1 year ago
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
babymother [125]

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

7 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
A customer has a new laptop with wireless WAN capabilities; however, the software does not connect to the Internet. What would y
LUCKY_DIMON [66]

Answer:

Check below for the explanation

Explanation:

The following suggestions will be given to the customers:

  • Go to network settings and check the WIFI settings to confirm whether the WIFI connection is on. Switch the WIFI to the on position if it is off.
  • The customer should check if the wireless driver is installed on the computer, if the driver is not installed, he should try to install it
  • The customer should check all the available access points and confirm if their signal strengths are strong enough to allow for any connections. Restart the access point to enhance proper connection.
  • Check to see if your operating system is updated to support your internet connection. You can update your operating system to the latest version
  • Run a Network Diagnostics on your computer. This will run a couple of tests to see what’s possibly causing your Wi-Fi issues.
5 0
4 years ago
Other questions:
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?
    6·1 answer
  • The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS
    7·1 answer
  • Simplify the Boolean expression AB+(AC)`+AB`C(AB+C)
    13·1 answer
  • Which of the following is a valid HTML reference to a CSS file?
    13·1 answer
  • The sameNumber method checks to see if the number of words in the phrase, numwords, is the same number of words contained in the
    5·1 answer
  • Who is the first British in Europe ​
    10·1 answer
  • How is video compression accomplished?
    10·2 answers
  • Discussion Topic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!