1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha2012 [34]
3 years ago
12

1. If you purchase the renters insurance policy described above, you bring a suitcase of clothing and other general

Computers and Technology
1 answer:
Mazyrski [523]3 years ago
7 0

Answer:

I think its c or d

Explanation:

hope this helps

You might be interested in
Savings accounts typically offer more interest than what
Serga [27]
The answer to this is B
8 0
3 years ago
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by usi
pantera1 [17]

Answer:

True

Explanation:

<em>IP Address</em>: It is used to uniquely identify each device over the network.

3 0
3 years ago
How can you tell if a hacker has administrative access?
olga55 [171]
I don't think you can know because if the hacker is smart he or she will know to cover up their tracks
8 0
3 years ago
Read 2 more answers
One purpose of the dual ignition system on an aircraft engine is to provide for?
Gnom [1K]
It is done to provide for better engine performance. It is important for two main reasons. One is that if one ignition system fails the other can for a time take care of it and hold its ground until you land or fix it. Another is that it is used for more efficient consumption of fuel and air which makes the engine work better.
7 0
3 years ago
Read 2 more answers
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
Other questions:
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • Which of the following best describes a good role model?
    6·2 answers
  • Discussion Six: Code of Ethics IT workers have many different relationships, including those with employers, clients, suppliers,
    7·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • ASAP FAST PLSKara is currently creating a storyboard for her web site. Which step of the web design process is she in? Coding Pl
    9·2 answers
  • What are Important points to include about preventing the download of malware?
    14·1 answer
  • Why is the access date important to include when citing a website? (select all that apply)
    9·2 answers
  • How many answer can you get daily
    7·2 answers
  • Why does Homework exist? Why is it so important?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!