1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
7

Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
8 0
Yes they are the leading tech innovators of the 21st century and have already made massive strides in this direction
You might be interested in
How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
xxTIMURxx [149]

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

6 0
3 years ago
Read 2 more answers
How do you put a picture when you ask a question?
Setler [38]

Answer:

there should be an option to attach an item. if not try pasting it

Explanation:

5 0
3 years ago
Read 2 more answers
Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
professor190 [17]
By doing 2200/18 you get 122 which is how many times you can have 18 go into 2200 and its also how long it will take in days to get her balance doubled.
3 0
4 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
A common preprocessing step in many natural language processing tasks is text normalization, wherein words are converted to lowe
Arturiano [62]

Answer:

def normalize(text):

   text = text.lower()

   text = text.split()

   return text

Explanation:

The functiinfunction is provided with an input text when called upon, then it changes every character in the text into lower case and split each word with a space.

4 0
3 years ago
Other questions:
  • You can use ???? a to test tread wear on your tires
    14·2 answers
  • What should you do prior to writing your business document?
    11·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • Is there a relationship between cybercrime and traditional crime?
    6·1 answer
  • 3.3 Code Practice: Question 1
    15·1 answer
  • PLZ help
    5·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • Which finger is used to press SHIFT key while typing!
    14·2 answers
  • I want the answer of this task ( using prolog language ) ASAP because the deadline is tomorrow. Please help :"
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!