1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
6

Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a

great location, but they are requesting that she send her personal information over the internet. What should Jackie do?
A) Ignore the request and not enter any personal information.
B)Provide only her name and date of birth.
C) Provide only her name and address.
D) Provide the requested information.

PLS HELP ASAP
Computers and Technology
1 answer:
topjm [15]3 years ago
5 0

Answer:

A

Explanation:

She is going to get scam

You might be interested in
A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
klio [65]

Answer:

40

Explanation:

hhhhhjjjj

5 0
3 years ago
Read 2 more answers
What is a small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an a
antiseptic1488 [7]

is a small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar PDA.

<h3><u>Explanation:</u></h3>

Personal Digital Assistant is the full form for PDA. PDAs are the computers in smaller size. They perform all works that are performed by a computer. They help you in viewing all the documents that you need, scheduling all your works,etc. They act as a mini sized computer that you can take where ever you go.

Using PDAs you can easily schedule any tasks, take notes, maintain all your contacts in address books,etc. Even though the markets of PDAs is not having higher demands because of the existence of i phones and other devices that are identical to i phones, there are still some usages and demands for PDAs. These are used in industries and businesses.

3 0
3 years ago
What are 2 of system software and how are they used?
xeze [42]

Answer:

System software is software on a computer that is designed to control and work with computer hardware. The two main types of system software are the operating system(Windows,Linux,Mac OS)  and the software installed with the operating system, often called utility software (Anti virus, Disk formatting, Computer language translators) . In some cases, the operating system and utility software depend on each other to function properly.

Some system software is used directly by users and other system software works in the background. System software can allow users to interact directly with hardware functionality, like the Device Manager and many of the utilities found in the Control Panel.

5 0
4 years ago
When creating an ad, how does Greg know what it will look like to his potential customers?
gladu [14]

Answer:

Greg can see previews of his ad in the Preview tab of his Google My Business account.

Google My Business is a free tool for businesses to manage their online existence across Google including Search and Maps. It also provides them to edit their business information which helps customers to find their business. They can also find how many customers searched for their business.

So once Greg's ad has been officially accepted, he can enter the specific keywords he’s targeting to have a generic view  of the ad in the browser. Google gives examples of desktop ads using the keywords selected in the campaign to make a general preview.  As Greg types his URL, headline, and description, a generic preview of mobile and desktop versions of his ad will show up.

3 0
3 years ago
True or false? because you have made it a practice to never access the
Flauer [41]

Answer: False

Explanation: Even if the internet service is not connected with the operating system while accessing the database, it is still on risk and can be vulnerable to get attacked. Devices of the system like USB drive can happen to have the malware which creates the risk towards database.

The computer system can get invoked with the virus or other attack while the user connects the internet afterwards when he/she is not accessing the database, these malware get stored in system once they get invoked and corrupt the system and its database even when the internet connection is not present .Thus, the statement given is false.

6 0
3 years ago
Other questions:
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • Can someone help me with...A table can help? PLEASE
    8·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    11·1 answer
  • Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
    6·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • PLEASE HELP!!!!!!!!!!
    15·2 answers
  • How many cubic millimeters are present in 0.0923 m3?​
    14·1 answer
  • Why is it important to think about the programming language to use?
    6·1 answer
  • Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!