Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.

security

what time of day you are online

protection of sensitive information

from which location you are accessing the site

Answers

Answer 1

Answer:

protection of sensitive information

Explanation:

Answer 2

Answer:

a c baka baddies

Explanation:


Related Questions

Write a Python code to take input of age of three people by user and determine youngest people among them

Answers

Answer:

# Take Ages

person1 = eval(input("Enter age of person 1 : "))

person2 = eval(input("Enter age of person 2 : "))

person3 = eval(input("Enter age of person 3 : "))

# check youngest

if person1 < person2 and person1 < person3:

print("Person 1 is youngest")

elif person2 < person1 and person2 < person3:

print("Person 2 is youngest")

elif person3 < person1 and person3 < person2:

print("Person 3 is youngest")

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

Which language paradigm interacts well with database systems in business environments that use SQL?

A) logic-based
B) fourth-generation
C) data-oriented
D) aspect-oriented

Answers

The answer is C, can you mark me brain

bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera​

Answers

Answer:

Hi not able to understand your language

When comparison shopping, all of these hint at a good deal EXCEPT_____________________.

Answers

Answer:

lower-priced models offer more features

Explanation:

Which command tells the for loop what to count by?
a. step
b. range
c. count
b. variable​

Answers

step is the answer. or option A

Answer:

A) Step

Explanation:

List two examples of following types of communication

Answers

Verbal Communication. Verbal communication occurs when we engage in speaking with others. ...
Non-Verbal Communication. What we do while we speak often says more than the actual words. ...

Answer:

Explanation:

sign language is communication

touch is communication

9.6 Code practice Edhesive

Answers

Answer:

N = [1,1,1,1,1],

[2,2,2,2,2],

[3,3,3,3,3],

[4,4,4,4,4]

def printIt(ar):

   for row in range(len(ar)):

       for col in range(len(ar[0])):

           print(ar[row][col], end=" ")

       print("")

           

N=[]

for r in range(4):

   N.append([])

   

for r in range(len(N)):

   value=1

   for c in range(5):

       N[r].append(value)

       value=value + 1

           

printIt(N)

print("")

newValue=1

for r in range (len(N)):

   for c in range(len(N[0])):

       N[r][c] = newValue

   newValue = newValue + 1

       

printIt(N)

Explanation:

I got 100%.

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def printIt(ar):

  for row in range(len(ar)):

      for col in range(len(ar[0])):

          print(ar[row][col], end=" ")

      print("")        

N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]

for r in range(4):

  N.append([])

for r in range(len(N)):

  value=1

  for c in range(5):

      N[r].append(value)

      value=value + 1

printIt(N)

print("")

newValue=1

for r in range (len(N)):

  for c in range(len(N[0])):

      N[r][c] = newValue

  newValue = newValue + 1

printIt(N)

See more about python at brainly.com/question/26104476

Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages

Answers

Answer:

Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.

Explanation:

PLZZZ HELP
Escaping Literal Quotes in Strings (JavaScript)
first pic is instructions
second pic is the code I have
Also, please provide feedback on the code I have.
WILL GIVE BRAINLIEST'
WILL REPORT ALL SCAMS

Answers

Answer:

If you just want to escape string literals, here are the ways to do it. There are at least three ways to create a string literal in Javascript - using single quotes, double quotes, or the backtick (). So, if you enclose your string in single quotes, no need to escape double quotes and vis versa.

Explanation:

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application

Answers

Answer:

The options for running a Windows 7 application on Windows 10 are;

1) Run the compatibility troubleshooter

2) Reinstall the app

Explanation:

The most recent version of Windows 10 supports the majority of applications made for versions of Windows before Windows 10, however, in the event that an application does not run on Windows 10 the options available for running the application are;

1) Run the compatibility troubleshooter as follows;

a) Type the application's name in the tax bar search box

b) In the menu showing the application that comes up, right click on the application's name and select the "Open file location option" from among the options menu

c) In the file location, locate and right click the program file which is the .EXE file and select "Properties" from the options menu. In the Properties dialogue box, select the "Compatibility mode"

d) In the "Compatibility mode" tab, select "Run compatibility troubleshooter"

2) Reinstall the app

a) With the app not yet installed on Windows, in the setup files location of the application, right-click the setup .MSI or .EXE application file

b) In the options menu select "Properties" and then the "Compatibility" tab in the "Properties" dialog box

c) On the Compatibility tab select the "Run this program in compatibility mode for" checkbox and select Windows 7 as your desired Windows

d) Click Ok.

BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this

also i love u grammarly

Answers

Answer:

I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!

Explanation:

Answer:

have u watched euphoria

Explanation:

lol

Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso

Answers

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​

Answers

Answer:

participle is singing

word it modifies is voice

Multitasking systems _____.

are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers

Answers

Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.

In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.

Answers

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

_______________is the career cluster that medical professionals are under.

Answers

I think the answer is Doctor ?

What does a computer program use as a means to evaluate a condition as True or False?

Answers

Answer:

true

Explanation:

Answer:

A Boolean expression.

Explanation:

A Boolean expression is a logical statement that is either TRUE or FALSE . Boolean expressions can compare data of any type as long as both parts of the expression have the same basic data type.

Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations

Answers

Answer: Insert

Explanation:

The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:

• Home

• Insert

• Page layout

• References

• Mailing

• Review

• View.

The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.

In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.

 Someone plzzz help !
Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?

Answers

Answer:

Good luck

Explanation:

You might find a software but normally you'd need two different OS's but it might be possible if you go under mouse and keyboard settings but it's highly unlikely you'll find what you're looking for there

What is a network?
A. The software only that connects electronic devices so they can
communicate with each other

B. The hardware only that connects electronic devices so they can
communicate with each other

C. The hardware and software that prevents electronic devices from
communicating with each other

D. The hardware and software connecting electronic devices so they
can communicate with each other

Answers

Answer:  For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.

The hardware and software connecting electronic devices so they can communicate with each other.

What is Network?

An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.

They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.

Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.

Therefore, The hardware and software connecting electronic devices so they can communicate with each other.

To learn more about Network, refer to the link:

https://brainly.com/question/15002514

#SPJ7

Posts that you delete _____.

cannot ever be shared

will be released in five years

are still visible to others

may already have been shared

Answers

May have already been shared

Answer: Below

Explanation:

hi please help ASAP it's about html!​

Answers

Given :-

Create a HTML code for writing a web page for your school time-table.

Answer :-

<html>

<head>

<title> Time Table </title>

</head>

<hrcolor = "red">

<hrcolor = "blue">

<body>

<table><tr = "7"><md = "7"><Period 1_></table>

</body>

</html>

[tex] \\ [/tex]

Answered by - ItzMaster

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz​

Answers

Answer:

The program is as follows:

5 INPUT A,B

6 PROD = A * B

7 PRINT PROD

8 TOTAL = A + B

9 PRINT TOTAL

10 DIFF = A - B

11 PRINT DIFF

12 END

Explanation:

This gets input for the two numbers

5 INPUT A,B

This calculates the product

6 PROD = A * B

This prints the calculated product

7 PRINT PROD

This calculates the sum

8 TOTAL = A + B

This prints the calculated sum

9 PRINT TOTAL

This calculates the difference

10 DIFF = A - B

This prints the calculated difference

11 PRINT DIFF

This ends the program

12 END

Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False

Answers

Answer:

True

Explanation:

True,My good sir/maam

When do you need to apply for a federal student loan?

Answers

Answer:

Explanation:

In order to apply for federal student loans, you must fill out your FAFSA during a specific time. The federal deadline for completing your FAFSA is generally very forgiving — meaning that it comes very late in the school year.

Briefly explain the main difference between how to connect a new office computer in the SHSS office to the internet and how to connect a standalone computer in your house to the internet

Answers

Answer:

Once you've set up your computer, you may want to purchase home Internet access, up a home wireless network, commonly known as Wi-Fi, so you can connect multiple. Now that you know about the different types of Internet service, you can do. The primary piece of hardware you need is a modem.

Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks

Answers

Answer:

</p><p>

</p><p>days1(); // calling function days1()

</p><p>

</p><p>function  days1() // function days1

</p><p>

</p><p>{

</p><p>

</p><p>var  week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",

</p><p>

</p><p>"friday"," saturday"];

</p><p>

</p><p>var i;

</p><p>

</p><p>for (i=0;i<7;i++)  // iterating over the loop

</p><p>

</p><p>{  

</p><p>

</p><p>document.write(" The number of days in a week :" +</br>);

</p><p>

</p><p>document.write( week[i] + "</br>" );  // print the number of days

</p><p>

</p><p>}

</p><p>

</p><p>}

</p><p>

</p><p>

Output:

The number of days in a week :

sunday

monday

tuesday

wednesday

thursday

friday

saturday

Explanation:

In this program, we create a function days1().In this function, we declared an array i.e "  week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

Other Questions
Avocado Pickers are paid as shown below. What would be the grossearnings for a worker that picks 1,108 avocados?1 - 500 Avocados $0.10 each501 - 700 Avocados $0.14 eachOver 700 Avocados $0.18 each A man purchased a used car for $5000 He decided to sell the car for 20% above his purchase price. He could not sell the car so he reduced his asking price by 20% ofhe sells the car at the reduced price will he have a profit or a loss or will he break even?Select the correct choice below and fill in any answer box to complete your answerA. The man will have a profit of __B. The man will break evenC. The man will have a loss of 5__ when was happened the colonization of east africa? pls helppppp only if u know the answr, brainliestttyou dont have to answr them all but ill appreciate it 7.8x = 32.76Show your work Given: Triangle ABC with AB = 45 and BC = 18. Which of the following are possible lengths for AC?351775670273063 Read the excerpt from Brown v. Board of Education.We must consider public education in the light of its full development and its present place in American life throughout the Nation.Why does the Supreme Court make this distinction?The court recognizes that the current delivery of education might compromise citizens rights.The court recognizes that the US education system has evolved over time.The court recognizes that people in some localities are being treated unfairly by teachers.The court recognizes that segregated schools require additional federal funding. help please !! will give brainliest:)) What is the height, in yards, of a cylindrical water tank that holds 1,884 cubic yards of water and has a diameter of 120 feet? Be sure to convert so you are using like units. what is the first Guinness book record can you please tell me what the answers are for the brainliest Wriring promt: Write a compare and contrast analysis of how culture shapes the heroes in Heart of a Samurai and Black Ships Before Troy. Use transition words in your draft to help clarify relationships of ideas. (this needs to be 150 words or more!) This bicycle had two wheels of the same size. The alignment of the front wheel was fixed. There were no pedals, so the bike was propelled by pushing off with your feet and the bike was steered by leaning.strider bikecruiserhobby horsemountain bike PLEASE HELP !! ILL GIVE 40 POINTS ; PLUS BRAINLIEST !! DONT SKIP ANSWER. 1. TRUE or FALSE: Tensions between Israeli's and Palestinians still exist today?A.TrueB.False natural selection vs artificial whats the difference Under her cell phone plan, Rajani pays a flat cost of $65 per month and $5per gigabyte. She wants to keep her bill under $85 per month. Write andsolve an inequality which can be used to determine g, the number ofgigabytes Rajani can use while staying within her budget. 10, 16, 18, 20, 20, 21, 24, 25,Q2 (median):Q1:Q3:Interquartile Range (IQR): Q3-Q1 - Which of the following explains why windmills were an important part of the sugar cane processing on Bettys Hope plantation?A.Bettys Hope plantation did not have access to running water to power the mill.B.The steady trade winds on the island could be harnessed for powering the gears in the mill.C.Bettys Hope plantation was so dry that cattle could not be used to provide power to the mill.D.Windmills were the best and newest technology of the time. Which of the following explains why a small conflict in the Balkans spread to all of Europe? (5 points)O aMany of the European powers had entered into alliances requiring them to defend each other.ObMost of the European powers lacked military defenses to stop an attack.Serbia refused all of Austria-Hungary's demands, prompting other nations to declare war.OdSlavs in Russia refused to support their fellow Slavs in the Balkan region.