1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
2 years ago
9

What is a way to Procter your social security number and other sensitive information from identity theft

Computers and Technology
1 answer:
Morgarella [4.7K]2 years ago
5 0
Hey mate 

by being smart about it and not telling anybody and if u find it no the inter net  call the police  
You might be interested in
(20 points) Given a collection of n nuts and a collection of n bolts, arranged in an increasing order of size, give an O(n) time
Blababa [14]

Answer:

Check the explanation

Explanation:

Keep two iterators, i (for nuts array) and j (for bolts array).

while(i < n and j < n) {

if nuts[i] == bolts[j] {

We have a case where sizes match, output/return

}

else if nuts[i] < bolts[j] {

what this means is that the size of nut is lesser than that of bolt and we should go to the next bigger nut, i.e., i+=1

}

else {

what this means is that the size of bolt is lesser than that of nut and we should go to the next bigger bolt, i.e., j+=1

}

}

Since we go to each index in both the array only once, the algorithm take O(n) time.

6 0
3 years ago
Intuit, a tax and financial planning software company, creates a website where its QuickBooks customers can interact about probl
andrey2020 [161]

Answer:

Digitalization

Explanation:

Instead of doing it manually they created one web site to interact with the customers through Internet and computer. so it is an example of digitalization where user avoids manual interaction

8 0
2 years ago
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software proces
soldi70 [24.7K]

Answer:

For the university accounting system that replaces an existing system the appropriate generic software process model is Waterfall model

This is because the requirement of the system can be predicted in advance because of the existing system and secondly, this a mission critical system and the requirement are stable and reusable

For the  interactive travel planning system that helps users plan journeys with the lowest environmental impact the appropriate generic software process model is Prototype Model

This is because the user's requirement may likely change and fast delivery is essential to be implemented and for this the prototype model can save time of development to focus on essential functions first.

Explanation:

In order to get a better understanding of the answers above let define the concept of

Waterfall Model:

   We can define waterfall model as a type of software development approach that explains step by step development method, this software development approach consist of five to seven steps and each step is characterized by different tasks and objectives and these steps combined together explains the the life cycle of the the software development process.

Prototype Model

   We can define prototype model as a type of system development approach whereby an estimation(i.e the prototype) of the final system is constructed,tested and adjusted until the desired result is obtained and the the main system is then constructed with the specification of the perfect estimation or prototype for example when constructing a bridge the engineer apply this methodology by first constructing an estimation or prototype of what the bridge should look like and then various test and adjustments are  been carried out on this prototype bridge afterward he main bridge is been constructed with the specification of the prototype.  

8 0
3 years ago
Select the correct answer.
Galina-37 [17]
Close call between researcher and project manager, but I say project manager
8 0
3 years ago
Read 2 more answers
What type of ospf packet is used to actually send lsas between neighbors?
Marrrta [24]
<span>LSU OSPF packets are used to send LSAs between neighbors. </span>
<span /><span>
</span><span>Adjacencies are first formed by the OSPF neighbors before the LSAs are shared. When two OSPF neighbors exchange their known LSAs with the OSPF Database Description packets, the device does not know the actual LSAs. These are sent using Link Status Update pockets.</span>



3 0
2 years ago
Other questions:
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • Professor Zak allows students to drop the four lowest scores on the ten 100 point quizzes she gives during the semester. Design
    13·1 answer
  • How is technology used in the voting process?
    5·1 answer
  • Name and describe the various features of the PC support pages of About.com.
    8·2 answers
  • Consider the university enrollment database schema: 547 Student(snurn: integer, snarne: string, majoT: string, level: string, ag
    10·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • What is social media ​
    13·2 answers
  • Which statement is most likely to be true about a computer network?
    12·2 answers
  • Which example best demonstrates an impact of computers on the economy?
    6·1 answer
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!