1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
7

It is generally safe to provide your social security number to

Computers and Technology
2 answers:
Veseljchak [2.6K]3 years ago
8 0
Banks, sometimes jobs you're applying to
kotegsom [21]3 years ago
7 0
Nobody but banks, cellphone companys, and telemarketers, the government already knows
You might be interested in
All of the following are benefits of automation except
Tasya [4]

Question 1:

4. it increases the number of employees

Question 2:

2. false

Question 3:

2. it causes great damage to the ozone layer

Question 4:

1. true



6 0
3 years ago
100 points !!! Some games fall under more than one category. For example, many racing games allow players to modify the cars the
Ugo [173]

Answer:

game 1: roblox, its not technically a game, however it contains game that could fall under more than one category. Game 2: Dungeons and Dragons could fall under role play and also adventure

Explanation:

7 0
3 years ago
Read 2 more answers
Benefits of etherchannel
Mariana [72]
An ether channel can give you high speed interface if it is successfully engineered. Combining 2 or more ethernet lets you create a logical ethernet link providing high speed links between switches. Also having etherchannel gives you a higher band width than what you costumed for.
5 0
3 years ago
gven an IP address and mask of 192.168.12.0/24, design an IP addressing scheme that satisfies the following requirements. Subnet
Reika [66]
Uh 69 +23= 92
Hope this helps :)
8 0
3 years ago
When a computer is the.................of an attack, it is used as an active tool to conduct the attack
BARSIC [14]

Answer:

Attack is an intentional or unintentional act that causes damage or compromises information of systems supporting it.When a computer is the subject of an attack, it is used as an active tool to conduct the attack.

On the other hand, when a computer is the entity being attacked, it is the object of an attack.

3 0
2 years ago
Other questions:
  • Bunch of points!!!!!!! help pls
    11·2 answers
  • You are given n sorted sequences each one containing n keys. You may assume n is a power of two. We want to merge them into one
    15·1 answer
  • Hurry plz
    8·1 answer
  • Digital art is created by using __?
    5·1 answer
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • Cuando hablamos de entornos digitales de enseñanza aprendizaje a que nos estamos refiriendo
    10·1 answer
  • which of the following cells can't be recarged? A. Electrode cell B. wet cell C. primary cell D. storage cell
    13·1 answer
  • Which is the best response to receiving a threating text from a classmate
    11·2 answers
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • How to deactivate the brainly account?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!