1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
5

Select all the activities Samil could so through his banking app.

Computers and Technology
2 answers:
trasher [3.6K]3 years ago
5 0

Answer:

Make a deposit

Talk to a representative

Transfer money

Check account balances

Explanation:

lisabon 2012 [21]3 years ago
3 0

Answer:

Make a deposit

Talk to a representative

Transfer money

Check account balances

Explanation:

You might be interested in
before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
masha68 [24]

It is an input and an output. The scanner scans the paper which is the input ,and the output is when the printer prints the paper.

3 0
3 years ago
Briefly explain the difference between modulating and encoding?
siniylev [52]

Answer:

Encoding is the process in which the digital or analog data are converted into digital signal. Encoding are used for efficient transmission and storage purpose by putting in the form of sequence of various number and characters.

There are basically three types of encoding:

  • Semantic encoding
  • Visual encoding
  • Acoustic encoding

Modulating is the process of encoding the information in a transmitted signal and converting the digital or analog data into analog signals. It is widely used in long distance communication. In modulating process, modulator is the device that are capable of modulating carrier signal.  

8 0
4 years ago
Suppose that you need to access a data file named "students.txt" to hold student names and GPAs. If the user needs to look at th
pogonyaev

Answer:

f = open('students.txt', 'r')

Explanation:

In the computing world, a command is an instruction to a computer program to execute a particular task. These instructions might be issued via a command-line interface, such as a shell program, or as a input to a network service as a component of a network protocol, or can be instructed as an event in a graphical user interface activated by the respective user selecting an option in a menu.

the f = open('students.txt', 'r') command line would be used to open a file named "students.txt", There are also various other types of commands for executing different task, for example:

1. ASSOC for Fix File Associations

2. FC for File Compare

3. IPCONFIG for IP Configuration

4. NETSTAT for Network Statistics

5. PING for Send Test Packets

6. TRACERT for Trace Route

7. POWERCFG for Power Configuration

e.t.c.

5 0
3 years ago
I’m quitting this thing so I’m giving all my points away which are 218!!! I’m still gonna have more tho just in case I ever need
Sedaia [141]

Answer:

skdjdishsjsbsisjsjsjsjsnssnsjsjsjsjsjsjjskdxkjdsisi

4 0
3 years ago
Read 2 more answers
True or false you have no control over who views your social network information
il63 [147K]
  Your answer would be false. That's what you have security settings for.
4 0
4 years ago
Read 2 more answers
Other questions:
  • True or false? Opinionated websites can still be credible. A. True B. False
    15·2 answers
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • In a proper webpage which tag holds all of a webpages visible HTML?
    9·2 answers
  • What are comments meant to do?
    12·1 answer
  • What are the modes of operation of WLANs?
    5·1 answer
  • A variable of the data type arrays is storing 10 quantities. What is true about these quantities?
    10·1 answer
  • Gary lives in an area that receives a lot of rain throughout the year. which device would be useful to him to maintain his compu
    8·1 answer
  • Let's practice Audience analysis by going to the Google Merchandise Store demo account with a date range of Feb 1, 2016 - Feb 29
    13·1 answer
  • A Color class has three public, integer-returning accessor methods: getRed, getGreen, and getBlue, and three protected, void-ret
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!