EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Answers

Answer 1

Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.

Read more: https://brainly.com/question/24112967


Related Questions

it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT

Answers

Ansgokublue

Explanation:

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

shang chi Critique (6-8 sentences)

Answers

Explanation:

.......................

In order to help prevent collisions with motorcycles, one of the hosts of the video recommends thinking of motorcycles as __________. A. fast-moving bicycles B. occupying a space the same size as a car C. unpredictable road users

Answers

There are lot of accidents on the high way due to motorcycles. In order to help prevent collisions with motorcycles, one of the hosts of the video recommends thinking of motorcycles as occupying a space the same size as a car.

There are some recommendations following distance when traveling behind a motorcycle. it is often longer for motorcycles than the normal two seconds that are recommended when following most vehicles.

The best recommendation is to give a three or four second  distance when travelling behind a motorcyclist.

Motorcycles often stays at your blind spot and you may not see them. This can lead to an unwanted collision and result in serious injury or death. It is best you give much space as you would a normal vehicle.

Learn more from

https://brainly.com/question/13408307

A customer reached out via Twitter Direct Message to your company, looking for support with a complex issue. A co-worker was already helping that user but is away on vacation. Which Hootsuite feature would be best to respond with?

Answers

The Hootsuite platform provides tools that enable a person to manage his social media activities in one spot. The Hootsuite feature that would be best to respond with given the above scenario is;

Hootsuite inbox

Using the Hootsuite inbox, a user can access the private and public conversations between a former user and a client.

You can see the post that prompted the customer to speak with the organization's representative.

After reading through the conversations, you can reply the client and take any step that is required of you.

Learn more here:

https://brainly.com/question/15321261

What is the process of proving that users are who they say they are, and confirming that they are authorized to access accounts

Answers

Answer:

User authentication

Explanation:

Select the correct text in the passage.
Which three phrases describe a wireframe?

Tracy uses a (pictorial summary of an entire website) in her team meeting. It is a (two-dimensional illustration) of how (each web page on a website will look.) Known as a workflow diagram, this (explains how pages in a website connect to one another.) It is a (design tool), and it (shows the overall framework of a website.) It is a (visual representation of how much space each element on a page should take.)

Answers

Answer:

A B D

Explanation:

True or false: Because there are so many different network configurations, operating systems, and strategies, it is a challenge for organizations to get their networks to work together effectively and securely.

Answers

Answer:

I think the answer is "true."

Explanation:

Because as you may know, there are many hackers and types of people who get private information from people. And different organizations must work together like you said. This requires a lot of brainstorming and connecting. It's a challenge because it needs many ideas, needs a lot of time for thinking, and making sure whatever they are doing is safe. (This is in my opinion)

How to combine multiple documents into one pdf.

Answers

Answer:

How to combine and merge your files into one PDF: Open Acrobat DC to combine files: Open the Tools tab and select "Combine files." Add files: Click "Add Files" and select the files you want to include in your PDF. You can merge PDFs or a mix of PDF documents and other files.

Explanation:

The area of the spreadsheet highlighted in red is the _____.

cell C1

formula bar

row C

column C

Answers

A spreadsheet is a software application which is used to display numerical data in a tabular form. It has further functions which includes organizing, displaying, calculating data, etc where the data can be viewed at a glance and retrieved from memory.

There are different types of spreadsheet which includes:

G00gle SheetMicrosoft ExcelLibreOfficeSmartsheet, etc.

Data can be arranged in rows and columns.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more here:

https://brainly.com/question/22101774

Answer:

column C

Explanation:

i got it right

W]hen a cryptographic system is used to protect data confidentiality, what actually takes place?

Answers

Answer: the Engine

Explanation:

once the engine take place its moves and goes faster

Assume the int variables i ,lo , hi , and result have been declared and that lo and hi have been initialized.
Assume further that result has been initialized to the value 0.
Write a for loop that adds the integers from lo up through hi (inclusive), and stores the result in result.
Do not declare any additional variables --
use only i,lo,hi.
------------------------
import java.util.Scanner;
public class forloop_add{
public static void main(String args[]) {
int i,lo=1,hi=3,result=0;
Scanner scanner =new Scanner(System.in);
System.out.println("Enter the lower limit:");
lo=scanner.nextInt();
System.out.println("Enter the upper limit:");
hi=scanner.nextInt();
///{
//write your code here
//start
//end
///}
System.out.println("Result:"+result);
}
}

Answers

Answer:

I don't get this question, what is the point of initializing lo and hi if you're gonna read an input of both later, which is gonna override?

Explanation:

You have been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client that connects to your company VPN server. What type of file should you create

Answers

Based on the information given, the type of file that the user should create is the batch file.

Batch file simply means a script file in Microsoft Windows. A batch file consists of a series of commands that will be executed by the command-line interpreter.

Since the user has been asked to create a file that will contain a series of Windows command-prompt commands that automate the creation of a VPN client, the batch file will be vital in this case.

Read related link on:

https://brainly.com/question/25520771

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B. reliable transport C. data transport D. performance enhancements

Answers

TCP is known to be a type of a connection-oriented protocol, while UDP is a connectionless protocol. TCP and UDP provide data transport between hosts.

TCP and UDP are known for their speed, as TCP is slower and can retransmit lost data packets than UDP. UDP is said to be faster, simpler, and efficient protocol.

Data transport is simply known to be an the energy problem. It is the amount of energy needed to transport a bit from the closest neighbor.

Data Transport Service gives  a reliable connection for moving large amounts of data at very fast speeds.

Learn more from

https://brainly.com/question/17695822

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

A _____ is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop.

Answers

A viewport is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop .

3 out of 5 citizens were eligible to vote 180 actually voted

Answers

Answer:

What is the question.

Explanation:

Answers:

Either 108/180

or 180/300

Depending on question since I dont know what ur asking

What does angularfirestoremodule. Enablepersistence() do.

Answers

What is the question

there is nothing clear stated here

You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers configured-one for each print device. Some of your users have one printer configured on their computer and other users have the other printer configured. You have found that users are often waiting for their print job to start because another print job is running on the same print device while the other print device sits idle. You want to maximize usage of both printers and avoid having users wait. What should you configure

Answers

Since you want to maximize the usage of both identical print devices (printers) and avoid having users wait, you should configure: printer pooling.

A printer can be defined as an electronic output device that is typically designed and developed to be used for printing paper documents containing textual information and images.

In this scenario, you want the two (2) identical print devices (printers) to print concurrently, so as to prevent users from waiting for their print job to start while the other print device sits idle.

Hence, you should configure printer pooling on both print devices (printers) because this feature would allow the two (2) identical print devices (printers) to share the same name and function as a single printer.

In conclusion, load balancing of print jobs can be achieved by configuring printer pooling on two or more printers.

Read more: https://brainly.com/question/17100575

Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization​

Answers

Answer:

filter options

layer options

category visualization

data value visualization

Explanation:

PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.

Answers

Answer:

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

Explanation:

Answer:

ur

Explanation:

ur mom

The type of software used in soa architecture is often referred to as what?.

Answers

Answer:

software-as-a-service

Explanation:

Systems management involves allocation of computer resources to keep all processes operating smoothly and at maximum efficiency. What aspects of computing do systems management tools handle? Which ones do you think are the most important? Why?

Answers

Answer:operating system (OS), program that manages a computer's resources, especially the allocation of those resources among other programs. Typical resources include the central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.

Explanation:

The important systems management tools are:

Resource Allocation

Performance Monitoring

Software Deployment and Updates

Backup and Recovery

Remote Management

Inventory and Asset Management

Given data:

Systems management tools handle a variety of aspects in computing to ensure the smooth and efficient operation of computer systems. Some of the key aspects that systems management tools handle include:

Resource Allocation: These tools manage the allocation of hardware resources such as CPU usage, memory, and storage to different processes and applications. They prioritize resource distribution to ensure optimal performance.

Performance Monitoring: Systems management tools monitor the performance of various components and processes, tracking metrics like CPU usage, memory utilization, network traffic, and disk activity. This helps identify bottlenecks and areas for optimization.

Software Deployment and Updates: They facilitate the installation, deployment, and updating of software applications and patches across multiple devices or servers in a network.

Backup and Recovery: Systems management tools handle data backup, disaster recovery, and data restoration to prevent data loss and ensure business continuity.

Remote Management: Many tools enable administrators to manage and troubleshoot systems remotely, reducing the need for physical presence and minimizing downtime.

Inventory and Asset Management: These tools track hardware and software assets, helping organizations maintain an accurate inventory and plan for upgrades or replacements.

To learn more about system management tools, refer:

https://brainly.com/question/29713596

#SPJ3

what is the kybert satellite

Answers

Answer:

i dont know....there is nothing on that piece of technology

Explanation:

Would my phone still work if I snapped it in half?

Answers

Probably not
Not a good idea my friend

Depends on if you wanna get it repaired or not

If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be used on 1 switch, so is that the case?

Only answer if you know, please.

Answers

Any game disc or card can be used on multiple consoles

what is an operating system that controls some aspects of the computer?

(not very well phrased, ik, it's coming from a crossword for one of my classes assigned as a snow day thing. looking for a seven letter word)

Answers

central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.

Answer: Windows

Explanation:

examples of operating systems include

windows

mac

linux

windows has seven letters

Other Questions
what is the additve inverse of 9/10 Batteries allow us to store energy for when its needed, such as starting a car engine or jump-starting another car whose battery has lost its charge. But batteries cannot operate without chemical reactions. What kind of energy do you think is stored in the substances within the battery? if you have 80 feet of fencing and want to enclose a rectangular area up against a long, straight wall, what is the largest area you can enclose part of the connection between the black sea and the Mediterranean Sea? What resulted from the end of joint control of the Pacific Northwest? Check all that apply. the creation of Oregon Territory the end of gold rushes in the area an increase in settlement across the area peaceful relations between settlers and American Indians conflict between settlers and American Indians is would you like to eat the lunch right?or would you like to eat lunch?which one is right? Thank you so much guys If I is parallel to m, solve for x. I recorded a video on my windows PC, but when i tried to play it i got this message:Windows Media Player cannot play the file. The Player might not support the file type or might not support the codec that was used to compress the fileis there a free online way i can fix this If the water surface elevation in reservoir B is 110 m, what must be the water surface elevation in reservoir A if a flow of 0.03 m3 /s is to occur in the cast iron pipe Simplify the following expression 4(x8)7x + 3 (in a test) Which choice is the correct answer Which of the following would you most probably used to pinpoint injuries and brain deterioration (It's not B)Select one:a.An MRIb.magnetic resonance imagingc.positron emission topographyd.computerized axial tomography Someone plz help me :( What method of development is used in this article a. Cause and a effect. B. Narrative order C. chronological order . D division or classification 1 point10. Lisa owns a small business. There was a loss of $14 on Monday and aprofit of $18 on Tuesday. On Wednesday there was a loss of $6 and onThursday there was a profit of $7. Find the total profit or loss.*$15 profit$45 loss$5 profit$10 profit Hiyaaaaaa! I need help with this assignment! Please help me out :D So were supposed to write a story but i dont have any ideas! List at least 1 idea and 3 important details thanks!!10 points!with a name What do you see in the garden? They Eyes were Warching GodFigurative Language: Chapters 5-9 Complete the recursive formula of the arithmetic sequence 8, -5, -18, -31,.. d(1)= d(n)=d(n-1)+