1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
12

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up

asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.
Computers and Technology
2 answers:
Irina-Kira [14]3 years ago
7 0

Answer:

a

Explanation:

sis is gonna get scammed

AVprozaik [17]3 years ago
4 0

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

You might be interested in
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
3 years ago
Read 2 more answers
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conv
sweet [91]

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

6 0
2 years ago
Which statement will add a string to the string pool?
Alecsey [184]

Answer:

string newstring="hello"

7 0
1 year ago
One advantage of using online note-taking tools is that they help students to
raketka [301]

Answer:

the correct answer is A

Explanation:

hope it helps

7 0
2 years ago
Read 2 more answers
How many pictures can a 32 mb memory card hold?
nasty-shy [4]
This depends on the number of pixels are in each picture. hope this helps.
7 0
3 years ago
Other questions:
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • O novo funcionário da equipe de desenvolvimento de sistemas está aprendendo os termos mais utilizados no dia a dia da empresa. A
    7·1 answer
  • What is the most likely result of making a plan for life after high school
    14·1 answer
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to
    15·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • I know this isn't a school question but it is important! how do I get out of hp hardware diagnostics UEFI on hp pc? (step by ste
    5·1 answer
  • 5. Why do we need programming language?​
    13·2 answers
  • ¿la tecnología en Venezuela a nivel educativo, es ideal para desarrollar adecuadamente un proceso de Educación a distancia?
    8·1 answer
  • What is a circular network.​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!