1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
3 years ago
6

You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the emai

l. Is it safe to reply?Why?
It's a scenario<3​
Computers and Technology
1 answer:
irina [24]3 years ago
4 0

Answer:

No.

Explanation:

I'm almost certain it's a scam. Banks generally don't use emails to contact clients. They use telephones and paper correspondence. If they contact you by email it is because they have no other way of getting in touch with you because you have changed your address and your phone, etc..

You might be interested in
dash is a set of communication standard using for transferring file information between computers in a network​
8090 [49]

Answer:

protocol

Explanation:

hope this helps.

4 0
3 years ago
What is a valence orbit?
Sergio [31]

Answer:

An atom consists of two basic parts: the nucleus and the electrons. The nucleus is the central core of an atom and is made up of protons and neutrons. Electrons are very light, negatively charged particles that surround the positively charged nucleus. Early models of the atom depicted the electrons circling the nucleus in fixed orbits, much like planets revolving around the sun.

Current theory suggests that electrons are housed in orbitals. This is a valence orbital or valence orbit

Explanation:

The outermost orbital shell of an atom is called its valence shell, and the electrons in the valence shell are valence electrons. Valence electrons are the highest energy electrons in an atom and are therefore the most reactive. this is where your valence orbit gets its name because it is the outermost shell.

8 0
3 years ago
Read 2 more answers
You have found statistics on the Internet that you would like to use in your speech.
miss Akunina [59]

Answer:

You cite them correctly and that the statistics are real.

Explanation:

5 0
3 years ago
Which should be addressed by stakeholders when reviewing the problem statement? Select all that apply. All possible outcomes hav
kumpel [21]

Answer:

  • The problem as they see it has been addressed
  • The solution proposed will meet their needs
  • The needs of their colleagues are being met
  • All issues and constraints have been identified

Explanation:

The stakeholders in a project or business involves every human resource of the business/project that is essential to the successful completion of the business/project at hand.

The factors to be addressed by stakeholders when reviewing a problem statement is very important for the success of the project hence : the problem as seen in the problem statement has to be addressed, the solution been proposed to solve every problem identified should meet the needs of every stakeholder, also every stakeholder in a project has to be carried along hence the need of every stakeholder has to be considered as well.

7 0
3 years ago
Name 4 components of a components system​
Veseljchak [2.6K]
The four main components are main memory, arithmetic and logic unit, control unit, and input/output (I/O). :)
4 0
3 years ago
Other questions:
  • Your company has recently been hired to install a smart security system for a large office building. The system will include sec
    12·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Do you need internet to play xbox one
    14·1 answer
  • Write the definition of a function named averager that receives a double parameter and returns-- as a double -- the average valu
    11·1 answer
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • How does the post process alert the user if it detects a hardware problem during the post process?
    6·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • Having data in a column formatted differently based on value is known as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!