1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
6

Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a

great location, but they are requesting that she send her personal information over the internet. What should Jackie do?
A) Ignore the request and not enter any personal information.
B)Provide only her name and date of birth.
C) Provide only her name and address.
D) Provide the requested information.

PLS HELP ASAP
Computers and Technology
1 answer:
topjm [15]3 years ago
5 0

Answer:

A

Explanation:

She is going to get scam

You might be interested in
Endnotes are indicated by
V125BC [204]

Answer:

The answer is D because u have the uppercase letter bold

4 0
3 years ago
Read 2 more answers
Are u a chicken nugget!!??
creativ13 [48]
Yes. Yes I would classify myself as the nugget of the chicken thank you for asking me. 
3 0
3 years ago
Read 2 more answers
Document templates are available online.<br> True<br> False
k0ka [10]
True anything is available online.
6 0
3 years ago
Read 2 more answers
Which top-level domain can be used by anyone, regardless of their affiliation?
Firdavs [7]

Answer:

C. org

Explanation:

org is an open domain so anyone is allowed to register a .org domain

7 0
2 years ago
I really need help with this question! Please help!
Pachacha [2.7K]

Explanation:

the third answer is correct

4 0
3 years ago
Read 2 more answers
Other questions:
  • There is a simple pattern for determining if a binary number is odd. What is it and why does this pattern occur
    6·2 answers
  • Assume that scotus is a two-dimensional character array that stores the family names (last names ) of the nine justices on the S
    6·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • Which of the following are ways that
    9·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • Project introduction​
    14·1 answer
  • Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months
    9·1 answer
  • What is adb command???​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!