Answer:
Hmm.
Explanation:
- Why should you memorize your social security number rather than carry your social security card in your wallet?
One big reason why you should NOT carry your social security number on you is that you could get robbed at ANY moment. And if someone has your Social security number, then they could slander your name.
- Explain why you will need to provide your social security number to employers.
You will need to provide your social security number to employers because they need to make sure that you are you.
<em>'Why do employers need my social security number? If an employer decides to extend you an offer, they will eventually need your social security number to verify your identity and work authorization and perhaps to complete a background check. However, they don't need it in the initial hiring phase.'</em>
Gift splitting permits a married couple to merge their gift tax exemptions to help enhance the advantages of tax-free gifting.
<h3>What is a gift-splitting gift?</h3>
This method is not automatic, and the ability to split gifts requires that certain prerequisites are met, including the consent of both spouses on a pointed federal gift tax return.
Gift splitting allows a wedding couple to combine their gift tax exemptions to help enhance the advantages of tax-free gifting.
The unified tax credit gives a set dollar quantity that an individual can gift during their lifetime and give on to heirs before any gift or estate taxes apply.
To learn about unified tax credit visit the link
brainly.com/question/8176727
#SPJ4
The phase 3 of a business report is the revision phase.
The revision phase involves revising, proof reading and evaluation.
In this phase, improving the content and sentence structure of the report, correcting the grammer, spelling, punctuation, and format of the report and adding, cutting, and recasting what has been written.
Therefore, the correct answer to the question is äll answer choices are correct".
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.