1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
10

What is a mortgage?

Computers and Technology
2 answers:
wel3 years ago
8 0
D is the answer. Have a good day!
PilotLPTM [1.2K]3 years ago
5 0
The last one it is a secured loan used to purchase a home
You might be interested in
"explain why professional software is not just the programs that are developed for a customer"
Darina [25.2K]

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






5 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
What type of program would you use to create a personal budget?
Rina8888 [55]

Answer:

Using a spreadsheet would be the best program for creating a personal budget.

Explanation:

With a spreadsheet, you can enter formulas to add or subtract from your budget, plus you can create charts and graphs as well.

8 0
2 years ago
The ______ Works on a single variable or constant. *​
lora16 [44]

Answer:

man

Explanation:

6 0
3 years ago
Concept of national sovereignty was established by the
Eduardwww [97]

Answer:

Explanation:

Thomas Hobbes. He was the one who provided the term with its modern meaning.

7 0
4 years ago
Other questions:
  • Create a file with a 20 lines of text and name it "lines.txt". Write a program to read this a file "lines.txt" and write the tex
    12·1 answer
  • Robert wants to start a mobile app development company that builds apps for both iOS and Android. He is researching different cr
    14·1 answer
  • All wireless networks have their own name, referred to as the ________, which is used to identify the network.
    11·1 answer
  • When you search google for​ dishwashers, you are likely to see a number of inconspicuous ads for​ advertisers, including product
    11·1 answer
  • Making an analogy between Freudian theory and the brain networks described in an earlier chapter in the text, primary process th
    10·1 answer
  • How is digital footprint created ?
    15·1 answer
  • Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c
    14·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·1 answer
  • What specific job usually includes the important pre-production step of making the
    12·1 answer
  • _______ is a very common approach to multisystem authorization.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!