Which is an example of a crime that might occur in an e-commerce transaction?
A customer’s new purchase is stolen after delivery.
A customer’s credit card information is stolen and used by someone else.
A customer can easily take merchandise without having to pay for it.
A customer pays an unfair price for the merchandise she bought.

Answers

Answer 1

Answer:

A costumers credit card information is stolen and used by someone else.

Answer 2

Answer:

A customer's credit card information is stolen and used by someone else.

Explanation:

Since e-commerce is online sales, the customer can not take merchandise without having to pay for it.

Also the customer can search for the best price.


Related Questions

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

Explica la importancia que tiene el plan de trabajo (cronograma) en los proyectos y porque se realiza antes de ejecutar la solución seleccionada. ayuda es para hoy :c

Answers

Answer:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación del proyecto) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

Explanation:

El plan de trabajo permite delimitar la necesidad a la cual se debe responder con una solución (descripción del problema), los hitos que se deben alcanzar (objetivos general y específico), los recursos requeridos para lograr desarrollar y aplicar la solución (marco teórico), los posibles beneficios derivados del proceso exitoso (justificación) y una administración racional y realistas de los recursos a disposición en cuanto a disponibilidad, tiempo y personal mediante una secuenciación de tareas (i.e. diagramas de Gantt), todo reduce el componente iterativo inherente a diseño y producción de un producto, permite prever posibles imprevistos y mantener una perspectiva realista y una eficiencia aceptable en cuanto a presupuesto, metodologías y tecnologías a usar.

El plan de trabajo debe incluir principios de ingeniería concurrente para minimizar para manera mejor los posibles imprevistos, usualmente difíciles de manera con principios de ingeniería secuencial.

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

What are the steps to add a bibliography to a document? 1. Create a using the proper steps. 2. Go to the tab on the ribbon. 3. In the Citations & Bibliography group, select the Bibliography drop-down menu. 4. Select the correct formatting from the three choices. 5. A bibliography is then added to the

Answers

Answer:

The steps required to add a bibliography after adding the sources of the information contained in the document and marking the references made in the text, are;

1. Click to select insertion point of the bibliography

2. Select the Reference tab by clicking on the Reference tab in the ribbon

3. Within the Citations & Bibliography group, select Bibliography to open  a dropdown list of bibliography format

4. Select the applicable format

5. By selecting the desired bibliography format, the bibliography is inserted at the selected insertion point of the document

Explanation:

Answer:

1. Create a

✔ citation

using the proper steps.

2. Go to the

✔ References

tab on the ribbon.

3. In the Citations & Bibliography group, select the Bibliography drop-down menu.

4. Select the correct formatting from the three choices.

5. A bibliography is then added to the

✔ bottom of the document

Explanation:

Edg 2021

You have worked as the network administrator for a company for seven months. One day, all picture files on the server become corrupted. You discover that a user downloaded a virus from the internet onto his workstation that propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do

Answers

Jeremy bryant is good

The smallest piece of information a computer can store is

Answers

Answer:

bit

Explanation:

confia

A bit is the smallest piece of information in a computer, a single value storing either 0start text, 0, end text or 1start text, 1, end text. A byte is a unit of digital information that consists of 8 of those bits.

According to the author, "U.S. Security strategy and U.S. Identity towards Internet governance are all anchored in the idea of freedom." On what basis does the author make that claim?

Answers

Answer:

The answer

Explanation:

Indicate whether the following statements are true or false:

a) Viruses protection programs only scan a computer's data for harmful viruses. True or False?

b) Software piracy is the authorised distribution and use of computer programs. True or False?

c) An individual has no right to examine the contents of any personal record representing him/her. True or False?

d) Information should not be held for longer than necessary.
True or False?

e) The privacy of the individual should be protected. True or False?

Answers

Answer:C

Explanation:I got it correct on the computer

Answer: a False (they scan for all of them)

b True

c False

d True

e True

Explanation:

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

todas las computadoras son controladas por hardware?

Answers

Answer:

"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."

Explanation:

(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)

in a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
a twig
a campfire
none of the above

Answers

Answer:

You would use a twig first :)

Explanation:

Answer:

The glowing embers from the crackling campfire lit up the nighttime sky.

Explanation:

Full from of Computer
: )​

Answers

Answer:

COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

In you question, it isn't from! it is form(;

Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.

But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.

You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want to make the most use of technology and keep your business alive.How would you go about it even when none of your employees come to office.Give me an idea how you are still running your business?

Answers

Answer:

You can use social media to advertise your product or service you don’t need to work to pay your employees insted create content as a way to help your business grow/expand.

Explanation:

Social media is a big platform and you can eventually find new potential clients and you can benefit yourself instead of paying someone

Edhesive lesson practice 8.3, question 5

Answers

Answer:

3

Explanation:

Following are the correct python code to find the length of the given parameter value.

Python code to find length:

print(len("stuff"))#printing length

Output:

please find the attached file.

Program Explanation:

In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.

Find out more about the length method here:

brainly.com/question/13527881

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?
A. Disable the switch ports connected to the network jacks in the reception area.
B. Move the receptionist's desk into the secured area.
C. Require users to use screensaver passwords.
D. Replace the smart card reader with a key code lock.

Answers

Answer:

D. Replace the smart card reader with a key code lock.

Explanation:

In other to increase the security of the company, the best security practice would be to replace the smart card reader with a key code lock. This is because, with the smart card reader, an unauthorised person who was able to pick up one of the cards could be able to access the secured work station.

On the other hand, if the area is accessed with key code lock, the, it is only the person who knows the code that will be able to access the secured work area. Of course, the key code will vary from one individual to another in the organization.

Place the code in the correct order. Assume the indenting will be correct in the program.
Third part
Second part
First part

A. class car:
model = "
year = 0
B. :: myCar = car()
C. :: myCar.model = 'Thunderbird'

Answers

Answer:

The correct order is A, B, C

Explanation:

Required

Place A, B and C in the correct order

The unordered code is an illustration of class and object in programming language.

First, the class must be defined. This is done in (A)

class car{model= " "; year= 0;}

Next, an instance of the class must be created. This is done in (B).

car myCar = new car();

Lastly, the objects of the class can be updated. This is done in (C) where model is set to Thunderbird

Answer:

1classcar 2myCar 3myCar.model

Explanation:

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

786

Explanation:

In Python, and of course many other programming languages, lists are one of the built-in data types used to store several items in a variable.

In creating a list, the items, which may be of different types (e.g integer, float, string e.t.c), are placed in a square bracket and each item is separated from the other by a comma. The following are an example of a list.

myList = ["fish", "meat", 5, 8, "egg"]

scores = [10, 34, 78, 90]

To access or retrieve an item in a list, the index of that item is used. Indexes start from 0. For example, in myList the first item (which is fish) has an index of  0. The second item (which is meat) has an index of 1 and so on. In scores, the first item (which is 10) has an index of 0, 34 has an index of 1, 78 has an index of 2 and so on.

Now;

i. to access the first item in myList, we simply write: myList[0]. This will give fish

ii. to access the third element in scores, we simply write: scores[2]. This will give 78

From the list given in the question which is:

list1 =  [ 'cyber', 786 , 2.23, 'square', 70.2 ]

print(list1[1]) will print the item at index 1 which is 786.

Therefore, the output of the code is 786

What is a simulation?

A) a computer-based program that tests knowledge in important areas

B) a computer-based program that can be used to solve problems

C) a computer-based program that designs other programs

D) a computer-based program that mimics a real-life event

Answers

Answer:

D, a simulation is a computer-based program that mimics a real-life event.

Explanation:

the first day anna read a quarter of the book. on the second day she read a third of the remainder. noticed that after two days he had 80 pages left unread. how many pages did the book have?​

Answers

Answer:

160 pages

Explanation:

[tex]Day\ 1 = \frac{1}{4}[/tex]

[tex]Day\ 2 = \frac{1}{3}Remainder[/tex]

[tex]Left = 80[/tex]

Required

The number of pages

Let the number of pages be x.

So, on day 1; we have:

[tex]Day\ 1 = \frac{1}{4}x[/tex]

After day 1, there are:[tex]\frac{3}{4}x[/tex] left ----------------- i.e x - 1/4x

On day 2, we have:

[tex]Day\ 2 = \frac{1}{3} * \frac{3}{4}x[/tex]

[tex]Day\ 2 = \frac{1}{4}x[/tex]

At this point, we have:

[tex]Day\ 1 = \frac{1}{4}x[/tex]

[tex]Day\ 2 = \frac{1}{4}x[/tex]

[tex]Left = 80[/tex] ---- pages left

The summation of all must equal x, the book pages

[tex]Day\ 1 + Day\ 2 + Left = Total\\[/tex]

[tex]\frac{1}{4}x + \frac{1}{4}x+ 80= x[/tex]

Simplify the left-hand side

[tex]\frac{1}{2}x+ 80= x[/tex]

Collect like terms

[tex]x - \frac{1}{2}x= 80[/tex]

Simplify

[tex]\frac{2-1}{2}x= 80[/tex]

[tex]\frac{1}{2}x= 80[/tex]

Multiply by 2

[tex]2 * \frac{1}{2}x= 80*2[/tex]

[tex]x = 160[/tex]

What is a number that refers to the position of an item on a list?
variable
parameter
operator
index
PLZ HELP IM TIMED

Answers

Answer:

Parameter

Explanation:

a parameter is an argument that is used to call something, for example in an array when 0 is referenced as the first element in the array.

describe orderly how to save a Word document into a folder​

Answers

In order to do that you go onto the document you are going to save, on the top left it has the word “file”, click on that, once clicked it should say “Save as” and click on that, it will then ask you where you want it or which folder and you click the folder you want and finally click “save”

Someone help me on this ?

Answers

Answer:

An expert - Similarity

No special materials - advantage

There maybe a long wait time - disadvantage

Explanation:

Answer:

An expert - Similarity

No special materials - advantage

There maybe a long wait time - disadvantage

Explanation:

How did Avery and Garth most likely create their
diagrams?

O Avery used SmartArt and added a shape, whereas
Garth used four shapes.

O Avery used four shapes, whereas Garth used
SmartArt and added a shape.

O Both Avery and Garth used SmartArt and added a
shape.

O Both Avery and Garth used four shapes.

Help!!!

Answers

Avery used smartart and added shake

Create a program that calculates the cost of a meal and drink in a restaurant. Display a small menu with three meals, three drinks and the price for each. The program should have the following functions: my_restaurant(): This function displays the menu and asks the user to choose a meal and a drink. It also calls the my_meal() and my_beverage() functions. my_meal(): This function allows the user to choose a meal and return the choice. my_beverage(): This function allows the user to choose a drink, size small, medium or, large, and returns the choice. meal_cost(): This function receives a parameter that represents the meal choice. Calculate the cost of the meal based on the users choice. beverage_cost() This method receives two parameters that represents the drink and size. Calculate the cost of the beverage based on the users choice. total_cost() This function calculates the grand total for the meal and drink. Calculate the sales tax at 6%.​

Answers

I think you have to use Excel application it's not anything hard.

what is meant by cyber law​

Answers

Explanation:

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device

Consumers who wish to make a purchase from other consumer on ebay need tl
.bid on item
.first contact ebay employee
.send an email to seller
.also place an item sale on the side

Answers

Answer:

Bid on item

Explanation:

Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.

When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.

Transferring data from a remote computer to a local computer is .....​

Answers

The answer is uploading

in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle​

Answers

Some disadvantages of taking part in a video-conference are:

1) Lack of communication from social cues (social cues are what we use to see if someone is in a good or bad mood)

2) There is a high chance of unstable network connection.

3) Technical and personal issues because not everyone is comfortable speaking on a video-conference platform.

4) It causes more stress due to the lack of organization when preparing meetings (because it’s so easy to just get on a device without preparing anything beforehand).

Hope this helped!

Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.

Answers

Answer on https://pastebin.com/raw/nHzXvbPP

Other Questions
How many kiloliters are there in 19,000 milliliters? A. 19 B. 1.9 C. 0.019 D. 0.0019 PLEASE ANSWER DUE IN 30 MINUTES IM GONNA FAIL ITS GRADE 7 WORK EZ HAP1.Why were rivers very important to Canadasdevelopment and history?2. What rivers run near to where you live? How are theyimportant to you? The ____ is equal to the sum of the squares of the market shares of all the firms in an industry. a. market concentration ratio b. Herfindahl-Hirschman index c. correlation coefficient d. standard deviation of concentration e. none of the above Hello friends! Can you write an article about animal rights? =) We have a 3.7 L container filled with 82 g of CO gas. This container is maintained at a temperature of 298 Ka) How many moles of CO gas are in this container?b) What is the pressure inside the container? How does sugar leave the phloem? how many atoms of carbon are in 6CO2 + 6H2O --> C6H12O6 + 6O2 in a three digit number, the hundreds digit is one more than the ones digit and the tens digit is twice the hundreds digit. If the sum of the digits is 11, find the number. If the hundreds digit of the number is x, the equation will be? 20 Points to solve and brainliest. Which exponential equation is equivalent to this logarithmic equation?log5 x - log5 25 = 7A. 7^9=xB. 5^9=xC. 7^5=xD. 5^5=x Carla,a 10-month-old infant,sees her caregiver enter the room carrying a bottle of milk for another child in the day care center.Carla watches the caregiver give the bottle to the other child,and then extends her hands toward the bottle,making noises that indicate she wants one as well.Her caregiver notices,picks Carla up,and quickly prepares a bottle for her.In this example,Carla is demonstrating A) knowledge of inferred intention. B) preoperational thinking. C) decentration. D) means-end behavior. An antibiotic kills 99.9% of a bacterial population. You would expect the next generation of bacteria Group of answer choices to be just as susceptible to that antibiotic as was the previous generation. to be more resistant to that antibiotic. to be more contagious than the prior generation. to die out due to the drastic decrease in population size. how might a country run out of water Essay about summer vs winter, which is better? 2y = 9x + 6slope = y-intercept = Determine the value of x 1)702)1403)404)280 A shop owner spent $540 to purchase a stock of computer keyboards. If the price of each keyboard had been reduced by $2, he could have bought 3 more keyboards. Find the price of one keyboard. Abigail invested $130 in an account paying an interest rate of 4 5 8 4 8 5 % compounded continuously. Hunter invested $130 in an account paying an interest rate of 4 7 8 4 8 7 % compounded daily. To the nearest hundredth of a year, how much longer would it take for Abigail's money to triple than for Hunter's money to triple? Which frequency word or phrase best completes this sentence? _________ corto el csped porque no tengo un jardn.A. SiB. NuncaC. CuandoD. Una vez Which of the following stages are not normal in the grieving process?Obargainingdenial and holding back tearsacceptanceall of the above Alguien se sabe el nombre de la cancin que sale en el captulo 37 de la temporada 2 de Snk o Atack on Titan en el minuto 4:21