1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
11

oogle Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swip

e their phones at checkout to pay for items.
Computers and Technology
1 answer:
likoan [24]3 years ago
8 0

Answer:

card

Explanation:

you can do all the same things you used to do with these apps ,like pay on stores or check out the items

You might be interested in
Where are methods listed in a UML class diagram showing three parts?
denis23 [38]

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

3 0
3 years ago
Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
Deffense [45]
<span>Virtual private network (VPN) is the answer</span>
3 0
4 years ago
When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
Andrew [12]

Answer:

d. IPv4 Address 192.168.0.4 is associated with the globe IPv6 address 2001:db8:0:10:0:efe

Explanation:

The adapter setting will be associated with the global IP address. When Ipconfig command is operate the IP address finds the relevant domain and then address will use a different subnet. The network will use both IPv4 and IPv6 subnets in order to execute the command.

8 0
3 years ago
List five characteristics of a series circuit
Paladinen [302]
1. The current is the same everywhere in the circuit. This means that wherever I try to measure
the current, I will obtain the same reading.
2. Each component has an individual Ohm's law Voltage Drop. This means that I can calculate
the voltage using Ohm's Law if I know the current through the component and the resistance.
3. Kirchoff's Voltage Law Applies. This means that the sum of all the voltage sources is equal to
the sum of all the voltage drops or
VS = V1 + V2 + V3 + . . . + VN
4. The total resistance in the circuit is equal to the sum of the individual resistances.
RT = R1 + R2 + R3 + . . . + RN
5. The sum of the power supplied by the source is equal to the sum of the power dissipated in
the components.
<span>PT = P1 + P2 + P3 + . . . + PN</span>
6 0
4 years ago
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
Other questions:
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
    11·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • ________ results when leisure time and available tools allow us to engage in creative acts.
    14·1 answer
  • Which of the following accurately describes one way that individual goods
    11·1 answer
  • Who invented the speaker?
    14·2 answers
  • As important as it is to plan ahead, sometimes you_____.
    10·2 answers
  • Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
    10·1 answer
  • Write the implementation of a class Cse20 Topic that represents a topic in the cse20 class. The class should implement the init
    13·1 answer
  • Luis saves an attachment that he received from Kevin. Where will the attachment save by default?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!