1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
5

Please help me!!!!!!!!

Computers and Technology
2 answers:
In-s [12.5K]3 years ago
6 0

Answer:

ont know

Explanation:

DerKrebs [107]3 years ago
5 0

Answer:d

Explanation:

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
What is the home enabled button view id in toolbar in android?
DaniilM [7]
The home enabled button takes you back to your main screen
6 0
3 years ago
Mrs. Schlair has an annual salary of $96,402.<br> a. What would her semimonthly salary be?
amid [387]

Answer:$4016.75

Explanation:64333/24

3 0
3 years ago
Write query to get the max and min salary of job_id 101​
taurus [48]

Answer:

SELECT  MAX(salary), MIN(salary) FROM salaries WHERE job_id=101

Explanation:

Assumptions were made on the column and table names...

5 0
3 years ago
Which destination ipv4 address does a dhcpv4 client use to send the initial dhcp discover packet when the client is looking for
Dima020 [189]
<span>A DHCPv4 client use the broadcast IP address to send the initial DHCP discover packet when the client is looking for a DHCP server. </span><span>
A workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. The client  does not know the addresses of DHCP servers, and that's why it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.</span>
5 0
4 years ago
Other questions:
  • Operating systems such as Microsoft Windows use a specific character before a file extension to separate it from the filename. W
    9·2 answers
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Arrange these steps of creating a presentation in the correct order.
    15·2 answers
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Explain the differences between apple and android
    14·2 answers
  • How does violating the SOLID principles make code hard to test?
    5·1 answer
  • What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
    7·1 answer
  • MENCIONA ¿POR QUÉ SURGE EL CIVISMO TECNOLOGICO?
    6·1 answer
  • Advantages of a grain crush​
    9·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!