Answer:
"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time
Explanation:
Answer:
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called Digitization
Explanation:
It is the process of converting “information in to a digital form”. Here the information are organized into bits. Mostly these data will be converted into the form of image. But these can be edited by converting once again into necessary format and even back to image too. There are specific tools which the user needs to install for editing the digital documents.
The reason why we need digitization is that
a) We want to convert hard copy into soft copy and store it in system.
b) We would like to edit the data in the hard copy and preserve as a fresh copy.
Answer:
True is the correct answer for the above question.
Explanation:
- The software is a collection of instruction which states the computer to how to do a specific work. The software developer only develops the software, but it is used by many users of the software who wants to do some specific task.
- The developer creates a graphical event for users through which the user can use the software of the computer system for his personal use.
- So the above line concludes that the software is for the user only. So the user interaction in software development is necessary which is also said by the question-statement. Hence the question statement is the true statement.
Answer:
TLS
Explanation:
In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)
TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.
Answer:
The screen protector may be interfering with the touch response
Explanation:
Screen protectors or commonly called screen guards are used to protect phone screens. In case they fall to the ground, these protectors act as shields to keep the phone screen from getting damaged. However screen protectors if not positioned or fixed properly may also cause hindrance to effective touch response as they become barriers to the touch screen.