Computers and Technology
Computers and Technology, 05.03.2021 15:40, dubouuu

Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a great location, but they are requesting that she send her personal information over the internet. What should Jackie do? A) Ignore the request and not enter any personal information.
B)Provide only her name and date of birth.
C) Provide only her name and address.
D) Provide the requested information.

PLS HELP ASAP

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 19:40, rakanmadi87
Solve the following javafx application: write a javafx application that analyzes a word. the user would type the word in a text field, and the application provides three buttons for the following: - one button, when clicked, displays the length of the word.- another button, when clicked, displays the number of vowels in the word.- another button, when clicked, displays the number of uppercase letters in the word(use the gridpane or hbox and vbox to organize the gui controls).
Answers: 1
image
Computers and Technology, 23.06.2019 21:30, quintonps12
Which of the following includes the three primary network access technologies? dsl, cable modem, broadband lan, wan, man voip, uc, iptv tcp/ip, ftp, dhcp
Answers: 2
image
Computers and Technology, 24.06.2019 00:30, rustjallison9928
Asecurity policy is a a. set of guidlines b. set of transmission protocols c. written document d. set of rules based on standards and guidelines
Answers: 2
image
Computers and Technology, 24.06.2019 10:00, wwwcarolynzouowficz
3. what do the terms multipotentialite, polymath, or scanner mean?
Answers: 2
Do you know the correct answer?
Jackie is planning a surprise birthday party for her best friend and is researching a location to ha...

Questions in other subjects: