Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give

Answers

Answer 1

Answer:

"The game shouldn't need your SSN to be playable; don't enter it."

Explanation:

Answer 2

The game shouldn't need your SSN to be playable; don't enter it."

What is SSN?

A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.

As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.

In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.

Therefore, The game shouldn't need your SSN to be playable; don't enter it."

To learn more about SSN, refer to the link:

https://brainly.com/question/2040269?

#SPJ5


Related Questions

3. Why is human resource plan made​

Answers

Answer: See explanation

Explanation:

Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.

Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.

Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.


Make me laugh or tell me riddles

Answers

Answer:

What do u call cow in earthquake??

Explanation:

Answer:

ok i made these by myself  hope you like it

Match the type of view in PowerPoint with its description.

Notes Page

shows thumbnail, slides, and notes panes

Normal View

shows slide order in thumbnails without the

slides and notes panes

shows slides in full screen mode one at a

time

Slide Sorter

Reading View

>

shows speaker notes in a page format

Outline View

4

shows on-slide text in order

Answers

Solution :

Notes Page

-- shows speaker notes in a page format

It is a place where one can type notes for the current slides to share them during the presentation to the audiences.

Normal View

-- shows thumbnail, slides, and notes panes

It is a place where one can write as well design the presentations.

Slide Sorter

-- shows slide order in thumbnails without the  slides and notes panes.

It provides with a view of the slides in a thumbnail form.

Reading View

-- shows slides in full screen mode one at a  time

The reading view helps to view and show the slide in a full screen and helps to read the content in the slide.

Outline View

-- shows on-slide text in order.

This a place where one can write his content as text form.

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Group of answer choices

Answers

The term [tex]\sf\purple{digital \:convergence}[/tex] refers to the use of a single unifying device that handles media, internet, entertainment, and phone needs.

[tex]\large\mathfrak{{\pmb{\underline{\red{Happy\:learning }}{\orange{.}}}}}[/tex]

binary calculation of 1110÷101​

Answers

10.90 not sure tho. POWKSKS
10.99009900990099





Would be the answer

tool that help to monitor the ongoing performance of the platform for Accenture​

Answers

Answer:

MyConcerto

Explanation:

Accenture may be described as an industry leader which renders professional services capable of solving various business problems by leveraging the use technology involving data and business intelligence to proffer solutions to their clients needs. The MyConcerto firmly known as the Accenture Intelligence Enterprise platform is designed to continously help businesses measure performance, identify shortfalls and proffer solutions using data driven insight. It offered a fully automated platform with predefined solutions geared at accelerating business decisions and adaptive solution.

MyConcerto is a tool which helps to monitor the ongoing performance of the

platform for Accenture​.

Myconcerto is a digital platform which brings together and incorporates

innovation and leadership qualities. It involves the use of technology and

solutions which results in exponential business outcomes.

These qualities help in the monitoring process of ongoing performance

which is available on Accenture.

Read more about Accenture here https://brainly.com/question/24937450

With this S/MIME function, anyone can view the message content, but only those with S/MIME capabilities can verify the message signature.

a. enveloped data
b. signed and enveloped data
c. clear-signed data

Answers

Answer:

The correct option is c. clear-signed data.

Explanation:

Clear-signed data enables a digital signature to be created by encrypting the message digest of the material to be signed using the signer's private key. But only the digital signature is encoded with base64 in this scenario. As a result, recipients who do not have access to S/MIME can see the content of the message but the message signature cannot be verified by them.

Based on the explanation above, the correct option is therefore c. clear-signed data.

What lets the computer's hardware and software work together?

Monitor

Central Processing Unit (CPU)

Computer Viruses

Operating System

Answers

Answer:

Operating System

Explanation:

The operating System lets the computer hardware and software work together.

Implement a class named MyArrayList that extends class the java.util. ArrayList. The class MyArrayList overrides the add(obj) method in the following way: it adds obj into the list if the object does not occur in the list or it occurs in the list only once; otherwise, if the object occurs in the list more than once, then the method does nothing.

Answers

Answer:

import java.util.ArrayList;

import java.util.Collections;

public class MyArrayList<T> extends ArrayList<T> {

 public boolean add(T obj) {

   if (Collections.frequency(this, obj) < 2) {

     return super.add(obj);

   }

   return false;

 }

}

Explanation:

According to the requirement, an element with the same value can occur at most twice in the list.

The Collections.frequency utility is useful to count the occurrances.

Sure, here's an implementation of the `MyArrayList` class that extends `java.util.ArrayList` and overrides the `add` method as described:

```java

import java.util.ArrayList;

import java.util.HashMap;

import java.util.Map;

public class MyArrayList<E> extends ArrayList<E> {

   "ATTHERATE"Override

   public boolean add(E obj) {

       // Count occurrences of each element in the list

       Map<E, Integer> countMap = new HashMap<>();

       for (E element : this) {

           countMap.put(element, countMap.getOrDefault(element, 0) + 1);

       }

       // Check if obj occurs in the list only once or not at all

       if (!countMap.containsKey(obj) || countMap.get(obj) == 1) {

           return super.add(obj);

       }

       // If obj occurs more than once, do nothing

       return false;

   }

}

```

In this implementation, the `add` method first counts the occurrences of each element in the list using a `HashMap`.

Then, it checks whether the given object `obj` occurs only once or not at all in the list. If so, it adds the object to the list using the `super.add(obj)` call.

If `obj` occurs more than once, the method does nothing by returning `false`. This way, the `MyArrayList` class ensures that duplicates are added only once, or not at all, as required.

Know more about java:

https://brainly.com/question/12978370

#SPJ5

1 convert (101011)2 ( )10 ? convert(596)10= ( )16 ? convert( 101011101)2 ( )16 ? convert(37)10= ( )2 ?​

Answers

Question:

(a) convert (101011)₂ = ( )₁₀ ?

(b) convert(596)₁₀= ( )₁₆ ?

(c) convert( 101011101)₂ = ( )₁₆ ?

(d) convert(37)₁₀= ( )₂ ?​

Answer:

(a) (101011)₂ = ( 43)₁₀

(b) (596)₁₀= ( 254)₁₆

(c) ( 101011101)₂ = ( 15D)₁₆

(d) (37)₁₀= ( 100101)₂

Explanation:

(a) convert (101011)₂ = ( )₁₀

This means that (101011)₂ be converted to base 10 (decimal).

To convert from binary to decimal, find the sum of the binary digits times their power of 2. i.e

(101011)₂ = 1 x 2⁵ + 0 x 2⁴ + 1 x 2³ + 0 x 2² + 1 x 2¹ + 1 x 2⁰

(101011)₂ = 1 x 32 + 0 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1 x 1

(101011)₂ = 32 + 0 + 8 + 0 + 2 + 1

(101011)₂ = 43₁₀

Therefore, (101011)₂ = ( 43)₁₀

(b) convert(596)₁₀= ( )₁₆

This means that (596)₁₀ be converted to base 16 (hexadecimal).

To convert from decimal to hexadecimal,

i. start by dividing the decimal number by 16 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 16 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

16 | 596

16 | 37 r 4

16 | 2 r 5

    | 0 r 2

Now combine the remainders starting from the bottom up. i.e

254₁₆

Therefore, (596)₁₀= ( 254)₁₆

(c) convert ( 101011101)₂ = ( )₁₆

This means that (101011101)₂ be converted to base 16 (hexadecimal).

To convert from binary to hexadecimal,

i. starting from the rightmost bit, group the binary digits into a group of 4 bits as follows

101011101 => 1   0101    1101

ii. the group that does not contain 4 bits is padded with 0s

101011101 => 0001   0101    1101

iii. using the hexadecimal table, convert each group to hexadecimal as follows.

0001 = 1

0101 = 5

1101 = D

iv. combine the result

15D

Therefore, ( 101011101)₂ = ( 15D)₁₆

(d)  convert(37)₁₀= ( )₂

This means that (37)₁₀ be converted to base 2 (binary).

To convert from decimal to binary,

i. start by dividing the decimal number by 2 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 2 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

2 | 37

2 | 18 r 1

2 | 9 r 0

2 | 4 r 1

2 | 2 r 0

2 | 1 r 0

  | 0 r 1

Now combine the remainders starting from the bottom up. i.e

100101₂

Therefore, (37)₁₀= ( 100101)₂

explain 5 important of using a word processor​

Answers

Answer:

Spelling

Word processors contain an electronic spell checker. The student writer has immediate feedback about misspelled words. Student must discern which of the computer-generated spellings is correct for the context. Teachers no longer have to red-ink spelling errors. They can focus on the few exceptions the spellchecker does not catch.

Security

Teachers and students gain a sense of security about losing assignments. When the student saves her work, she avoids the possibility of the assignment being lost or misplaced. If an assignment is ever misplaced, a replacement can be easily printed.

Legibility

Teachers benefit by receiving a readable copy that is easy to grade. Students with poor handwriting can increase their scores with better looking papers. Students should be instructed to turn in copies of work in a readable font.

Publishing

Work done on a word processor can easily published on a bulletin board. Teachers can create electronic anthologies of their students' writings. Each student can receive an electronic copy of published works with no printing costs.

Mobility

Work done on a word processor and saved on the Internet is highly portable and accessible from any computer with Internet access. Dogs do not eat papers in cyberspace. "I forgot it at home" is irrelevant. Just log onto the nearest computer and your work appears on the screen.

Explanation:

Answer:

1. they are faster creation of document.

2.document can be stored for future use.

3. quality document are created.

4. it has access to higher variation.

5. tiredness Is greatly reduced.

What component can you use to open windows?
-A servomotor
-An LED
-A buzzer
-An ambient light sensor

Answers

Answer:

A servomotor.

Explanation:

Because you can only open the window with the force given by the servo motor.I am not sure tho

What is the purpose of this parallelogram shape in a flowchart?

Answers

Answer: Parallelogram A parallelogram is used to read data (input) or to print data (output). Rectangle A rectangle is used to show the processing that takes place in the flowchart. Diamond A diamond with two branches is used to show the decision making step in a flowchart.

HOPE THIS HELPS!!

Software that enables the organization to centralize data is called A. Data Repository B. Data Base Management System C. Data Warehouse D. Data Mart E. Data File

Answers

Answer:

B. Data Base Management System

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).

Question # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.

Answers

Your answer is outline.

An outline is the tool that will help you the most when developing the content you will use in your presentation.

What is presentation?

A presentation is a method of communicating information from a speaker to an audience.

Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.

An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.

It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.

A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.

Thus, the answer is outline.

For more details regarding presentation, visit:

https://brainly.com/question/938745

#SPJ7

Which model represents any process in general?
O A.
universal
OB.
transactional
O C.
linear
OD.
flowchart
OE.
interactive

Answers

Answer: A. universal

Explanation: correct on Plato

User account
2. The system allows user to register and create the account
3. Users allowed by system to edit & modify the account
4. System allows users to view products
5. System allows users to comment on product
6. Perform sentiment analysis
7. Use APS to connect to product
8. Review website to collect comment of product
9. System dynamically analyze command of users
10. Matching keyword in database
11. system allots rank to product as good, bad and ugly
12. view product review
13. users can use system to view product
14. manage users account
15. all users account allowed to be added or modified , and deleted by administrator


Non Functional Requirements:

1. Efficiency

2. Interoperable

3. Portability

4. Security

Part A: Answer the following questions prefer to the previous requirements?

Question :

Three Use-Case Narrative. Choose one major use-case for each player (Customer, Shop Owner, and Administrator).

Answers

Numa máquina térmica uma parte da energia térmica fornecida ao sistema(Q1) é transformada em trabalho mecânico (τ) e o restante (Q2) é dissipado, perdido para o ambiente.



sendo:

τ: trabalho realizado (J) [Joule]
Q1: energia fornecida (J)
Q2: energia dissipada (J)


temos: τ = Q1 - Q2

O rendimento (η) é a razão do trabalho realizado pela energia fornecida:

η= τ/Q1

Exercícior resolvido:
Uma máquina térmica cíclica recebe 5000 J de calor de uma fonte quente e realiza trabalho de 3500 J. Calcule o rendimento dessa máquina térmica.

solução:

τ=3500 J
Q1=5000J

η= τ/Q1
η= 3500/5000
η= 0,7 ou seja 70%

Energia dissipada será:



τ = Q1 - Q2
Q2 = Q1- τ

Q2=5000-3500
Q2= 1500 J

Exercicio: Qual seria o rendimento se a máquina do exercicio anterior realizasse 4000J de trabalho com a mesma quantidade de calor fornecida ? Quanta energia seria dissipada agora?



obs: Entregar foto da resolução ou o cálculo passo a passo na mensagem

What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?

Answers

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

Claire needs to make an SRS document. Help her identify the given section and subsection.

The ___ subsection mentions the list of factors that may influence the requirements specified in the SRS. This subsection is part of the section named ___

Blank 1:
A. Scope
B. Purpose
C. Assumptions

Blank 2:
A. Introduction
B. General Description
C. Specific Requirements

Answers

Answer:

C and B in that order

Explanation:

What lets you do many things, like write book reports and stories?

Application Programs

Antivirus Software

Email

Duct Tape

Answers

A -
Application programs
application progarms lets you do many things

Which is the best definition of manageable?
A. asking for help from others
B. making a plan
C. breaking down a big goal into smaller pieces
D. creating multiple goals

Answers

Answer:

D. Creating mutiple goals.

Explanation:

Telephone – Cable/ Radio -​

Answers

Answer:

Telephone – Cable/ Radio -​ Wireless

What is not an advantage of a computer network?


Select one:

A.Remote Information Access

B.Interaction among cooperative application programs

C.Social Engineering

D.User Communication

E.Resource Sharing​

Answers

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

In which SDLC step does the company translate broad, user-oriented systems requirements into the detailed specifications used to create a fully developed system

Answers

Answer:

Physical design.

Explanation:

Systems development life cycle (SDLC) is a strategic process that involves determining the overall system architecture, which is typically comprised of hardware, end users, physical processing components, software, and the communication channel that will effectively and efficiently satisfy the essential requirements of the system.

The system inputs and outputs is typically designed along with a plan of how the system's features will be navigated.

Basically, system design is divided into two (2) categories and these includes;

I. Logical design.

II. Physical design.

Furthermore, the design of service systems involves the process of planning, creating infrastructure, building communication, organizing staffs and standardization of a system so as to improve its quality and business relationships between the service provider and its clients.

In the physical design of systems development life cycle (SDLC), broad, user-oriented systems requirements are obtained from end users by companies and then translated into the detailed specifications that would be used to create a fully developed system.

Does anyone know how to fix this? Everytime i make a new page it only types in the middle of the page. I want to type at the top

Answers

Answer:maybe start a new page or try hitting delete

Explanation:

Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract { public abstract double findArea ( ); } public abstract class Rectangle { public abstract double findArea ( ); } public class Rectangle { public abstract double findArea ( ); } public class abstract Rectangle { public abstract double findArea ( ); }

Answers

Question

Which of the following class definition defines a legal abstract class Group of answer choices

(a)

public class Rectangle abstract {

   public abstract double findArea ( );

   

}

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

   

}

(c)

public class Rectangle {

   public abstract double findArea ( );

   

}

(d)

public class abstract Rectangle {

   public abstract double findArea ( );

   

}

Answer:

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

}

Explanation:

When a class is declared with the abstract keyword, the class is called an abstract class. Abstract classes cannot be instantiated and may include one or more abstract methods. If a class contains an abstract method, then it (the class) must be declared abstract.

In Java, abstract classes are defined using the following format:

[access_modifier] abstract class [name_of_class]

[access_modifier] specifies the access modifier of the class which could be public, private, e.t.c

abstract is the keyword that specifies that the class is an abstract class.

class is a keyword used for defining classes

name_of_class specifies the name of the class.

The only option that fulfils this format is option b where;

(i) The access modifier is public

(ii) The name of the class is Rectangle

Option a is not correct because the abstract keyword is supposed to come before the class keyword.

Option c is not correct because the keyword abstract is missing. In other words, the class must be declared abstract since it contains abstract method findArea();

Option d is not correct because the abstract keyword is supposed to come before the class keyword.

Advantages that excel have over paper and pen work​

Answers

Answer:

You can use formulas to create systems on excel.

Explanation:

investigate the design objective of hybrid computers​

Answers

Explanation:

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations

type of operating system used i handleheld device

Answers

Answer:

6

Explanation:

Palm OSPocketOSSymbianOSLinuxOSWindowsAndroid

Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space. For example, this would be an acceptable file:

Answers

Answer:

The solution in Python is as follows:

filename = input("File: ")

fll = open(filename, "r")

for line in fll:

for i in line.split():

 print(i,end='\t')

print()

Explanation:

The complete question implies that the program reads a file and displays the file content in a structured way (tabs or spaces)

The explanation is as follows:

This gets input for the file name

filename = input("File: ")

This opens the file for read operation

fll = open(filename, "r")

This iterates through the lines of the file

for line in fll:

This iterates through each line (splitted by space)

for i in line.split():

This prints the current element followed by a tab

 print(i,end='\t')

This starts printing on another line

print()

Other Questions
Please help I am confused explain your answer and brainliest Which provision of the United States Constitution best supports the idea expressed in this quotation? Choose the correct equation of the circle. Center: (13,13) Radius: 4(don't judge me i was 2 lazy 2 type all the answer options until i discovered the answers where pics so i copied and pasted options here) I just need an idea for what to write! what is the measure of the angle marked to the nearest 10th? (giving brainliest and thanks to all!) Originally, unions only supported manufacturing jobs; however, today, unions also support white collar jobs. Which of the following would be a "white collar worker? A. A part-time employee with no job skills B. A manual laborer with minimal job skills C. An employee whose job requires a high level of education D. Any employee who is male underline the adverbs in the following sentences a.tarry left her diary under her pillow help will give brainliest What is the perimeter of the triangle? Show your work.Y129 pLEASE I BEG OF U HELP - ill give brainliest is discipline overrated What is the mean of 2,0,1,0,4,3,1,0,7 Michele correctly solved a quadratic equation using the quadratic formula as shown below.Which could be the equation Michele solved?A. B. C. D. 3. Which number is the largest?(A) 0,56(B) a half C) 0.0599 (D) 0,09 (E) a half What is the value of this expression? Could a polyhedron exist with the given number of faces, vertices, and edges? Drag yes or no to each combination A plastic sack contains 20 green and yellow, 14 red and yellow, and 16 orange and yellow gummy treats. How much greater is the probability you will randomly select a green and yellow treat that an orange and yellow treat? If point A is between points Band C and AB = 26 and BC = 50, find AC.24667816 PLZ PLZ HELP I DONT UNDER STAND THIS!!Many games involve chance and they usually involved either dice or cards. For this activity, we will look at a common game called 711 where two dice are rolled. If the roll adds up to 7 or 11, the player wins. If the roll adds up to 2, 3, or 12, the player loses. If there is any other sum, it is a draw (no winner or loser). Use this twodice roll scenario to complete the problems below. . What is the probability for each of the sums below? NOT A MULTIPLE CHOICE.2=3=7=11=12= please help me with this one