1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
3 years ago
5

A smart card is?

Computers and Technology
1 answer:
Tom [10]3 years ago
8 0

Answer:

i think....(b)

Explanation:

please say yes or no answer....

You might be interested in
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
To move or copy a range of cells, select the correct order:
Karo-lina-s [1.5K]

Answer:

Correct Order

2. Select the cell or range you want to move or copy.

1. Move the pointer over the border of the selection until the pointer changes shape.

3. To move the range, click the border and drag the selection to a new location, or to copy the range, hold down the Ctrl key and drag the selection to a new location.

Explanation:

To move or copy range of cells in MS Excel, You first select the cell/range you want to move or copy, hover the mouse pointer and take note when it changes shape, then finally click the border (when you noticed the change of shape of the pointer) and hold down the ctrl key and drag it to the destination location.

6 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Given the following code char a[2][4] = { { 'c', 'a', 'r', 'b' }, { 'i', 'k', 'e', '\0' } }; char *p = &a[0][0]; while (*p !
adell [148]

Answer:

You'd get a compiling error.

Explanation:

Since this code is presumably written in C++, it doesn't include an "int main()", and without it you'll have a compiling error when you create functions. Since the start of a C++ program is looking for "int main()" and one doesn't exist, the program cannot compile.

Since the only function here is the while statement, then that's what the compiler will scream at you for. If you put all of this code within an "int main()", you'll no longer have a compiling error, and you'll have "carbike" written to the console.

I hope this explanation helps! You're welcome!

7 0
2 years ago
In your own point of view, what is the importance of considering the relationship of the basic design concept like line, color,
bazaltina [42]

Answer:

future

Explanation:

4 0
3 years ago
Other questions:
  • PLEASE HELP!! In Tynker does anyone know how to do the physics cannon assignment?
    5·2 answers
  • In Excel, an anchor($) allows you to:
    7·2 answers
  • What is the purpose of requirements gathering
    9·2 answers
  • To run a PHP application that has been deployed on your own computer, you can enter a URL in the address bar of your browser tha
    13·1 answer
  • Marsha is working on a group project and needs to start putting together a slide presentation for the group. Two of her group me
    5·1 answer
  • Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
    15·1 answer
  • The status bar only lets you view the current X, Y and Z coordinates of the cursor. Select one: True False
    8·2 answers
  • How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be re
    11·1 answer
  • Regular languages are closed under complement. True False
    7·1 answer
  • 1. How can you help prevent being a target of cyberbullying?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!