1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
13

I need help can someone help

Computers and Technology
1 answer:
Alona [7]3 years ago
8 0

Answer:

Bank Reconciliation

Explanation:

I think

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
software that instructs the computer how to run applications and controls the display/keyboard is know as the___.
kakasveta [241]
The answer is the alu arithmetic logic unit.
8 0
4 years ago
Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.
Andrew [12]

Entry controlled loop - <u>The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.</u>

So, for and while loops are its examples.

6 0
3 years ago
An Operating System is an application just like any other applications we use on our computers. What makes an Operating System s
tatyana61 [14]

Answer: An operating system(OS) is an interface between the hardware and the user. An OS is built so that it could support other software. OS is a system software which is used to support other application softwares.

Explanation:

An operating system handles all the hardware of the system and allows users access to those hardware components with the help of application softwares.

An OS consist of many libraries and APIs which allows programmers to write and execute codes. There are many types of OS such as real time, multitasking, multi programming OS.

The OS is responsible for allocating memory, managing the hardware, distributing resources across different processors in an distributed system.

So all these features makes them different from application software. The OS is responsible allocating memory and hardware resources to these softwares.

3 0
3 years ago
How do you post a picture on brainly? How do you also lower the points to like 5,brainless to the first understandable answers
Morgarella [4.7K]
To post a picture you just need to click on the clipper looking thing 
3 0
3 years ago
Other questions:
  • Which part of the cryosphere comes directly from the atmosphere?
    13·2 answers
  • ____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.
    14·1 answer
  • Explain the factors involved in selecting a routing protocol to be used on a network.
    12·1 answer
  • In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.
    12·1 answer
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • Electronic mail is best used to:
    5·2 answers
  • An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a
    10·1 answer
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
  • You want to add a caption to a table. which tab contains this option?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!