1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
12

Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?

Computers and Technology
1 answer:
AlladinOne [14]3 years ago
6 0

Answer:

7 hours in the plane. 45 minutes from the airport to 505.

You might be interested in
Which of the following would be better communicated with an image than with text?
slega [8]

Answer:

A decor to a wedding

Explanation:

its bc who would want to know how its described when u could look of how it looks u might be speechless

8 0
3 years ago
Where in an email would u find information about the action requirements​
Assoli18 [71]

Answer:When trying to find the action that you need to do in an e-mail, it is best to consult the body of the email, also known as (B) in the message.. The message would detail the tasks that you need to tackle, which are generally not detailed in the subject line, greeting, and you will most definitely not find in the to field.

Explanation:

3 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Will this solution really fix the problem?
vova2212 [387]

Answer:

yes it will

Explanation:

6 0
3 years ago
If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
MAVERICK [17]
Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.
6 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • Given the following code, what is output by the method call, mystery(6 * 8)?
    8·1 answer
  • What key combination in excel takes you back to the first cell
    7·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • What is an identifier? Give an example of an identifier.
    13·1 answer
  • Which type of choir often sings AND dances while they perform?
    9·1 answer
  • What happens on your screen when you click on the eyedropper tool in Scratch? The background of your scene will become transpare
    7·1 answer
  • [2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!