1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
7

It is generally safe to provide your social security number to

Computers and Technology
2 answers:
Veseljchak [2.6K]3 years ago
8 0
Banks, sometimes jobs you're applying to
kotegsom [21]3 years ago
7 0
Nobody but banks, cellphone companys, and telemarketers, the government already knows
You might be interested in
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turn
Darya [45]

Answer:

Time machine.

Explanation:

An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.

OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.

A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.

5 0
3 years ago
. Database connectivity software is also known as:
astra-53 [7]

Answer: Database middleware

Explanation:

   Database connectivity is the technique by which application programs makes the interaction and transfer of data storage . The connectivity of the database of the software is called database middleware, as it acts as a piece of software that makes connection as a middle-factor between the application program and the collection of data.

Therefore, database connectivity is also called as database middleware.  

5 0
3 years ago
Describe how data center storage applications drive the development of SAN technology.
Ede4ka [16]

Answer:

 The storage area network basically apply in the networking model for storage various application in the data center. The storage area network (SAN) provide the common pathway between the server and the storage device.

The storage area network technology basically implemented in the fiber channel configuration over the ethernet. SAN provide access to the data that shared by the personal resources. It is basically simple and dedicated network which provide for the data storage.

 

5 0
3 years ago
A(n) __________ is a server with the original copy of the data that others need.
Paha777 [63]
A documment is a server with the original copy of the data that others need.
8 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
Other questions:
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • Your mom wants to purchase a computer. She has heard about how the Windows 8 operating system is best-geared for a touch-enabled
    10·2 answers
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • What is the output of the following program?
    11·1 answer
  • Suppose you are choosing between four different desktop computers: one is Apple MacIntosh and the other three are PC-compatible
    15·1 answer
  • What is the orbit? Define
    12·1 answer
  • Please describe the role of games in modern society!
    5·2 answers
  • A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!