EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Answers

Answer 1

Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.

Read more: https://brainly.com/question/24112967


Related Questions

If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect three function call direct continuous

Answers

If, in a recursive solution, function A calls function B which calls function C, this is called Indirect recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

https://brainly.com/question/3169485?referrer=searchResults

Is noreasters the kind of weather that a place has over a long period of time (true)or (false) ?

Answers

It is true hope this helps

Select the correct text in the passage.
Which three phrases describe a wireframe?

Tracy uses a (pictorial summary of an entire website) in her team meeting. It is a (two-dimensional illustration) of how (each web page on a website will look.) Known as a workflow diagram, this (explains how pages in a website connect to one another.) It is a (design tool), and it (shows the overall framework of a website.) It is a (visual representation of how much space each element on a page should take.)

Answers

Answer:

A B D

Explanation:

The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on the directory only allow the user and group owners to view the contents of the directory. Users who are not part of the group owner are unable to list the contents of the directory.

As part of a new company policy to increase teamwork, you want to allow all users to be able to see the /sales directory and list its contents. You also want to let all users open, but not change, any document inside that directory.

Task:

Allow the other group to browse the /sales directory.

Modify permissions on all files in the /sales directory to allow members of the other group to view but not change the file.
Type:

chmod o+rx /sales

Answers

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

File permissions are often set or changed using “Change Mode.” o+ Add permission for “others” with – (remove) r (other possible options include u (user) and g (group)). Permission is read. Implement permission (other possible values include w – write permission)

What is main function of the chmod?

What permission—read (r), write (w), or execute—is third? (x). You would enter chmod o+rx [filename] to add world read and execute permission to a file using symbolic mode. You would type chmod o-r [filename] to make a file world read-only.

— rw-r—r— (644) — Group members and others can only read; only the user has read and write access. — rwx——— (700) — Reading, writing, and executing are all restricted to the user.

Therefore, RWXRXRX (755) — Only the user and the group and others can read and execute; the user has read, write, and execute permissions.

Learn more about chmod here:

https://brainly.com/question/14187643

#SPJ2

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Pedestrians, bicyclists, and skateboarders _____ the rules of right-of-way when they use the road.

Answers

Pedestrians, bicyclists, and skateboarders must follow the rules of right-of-way when they use the road.

Choose the correct function to yield the shown result.
>>>____(3)
3.0

- int
-round
-float
-str

Answers

Answer:

int

Explanation:

Correct on edg test 2021

Civilization V is a game that can be won in a number of ways, including maximizing your civilization's diplomatic, scientific, or cultural standing, making it so the player is intensely focused on winning the game. This is an example of what type of immersion?

Tactical immersion
Strategic Immersion
Non-player immersion
Pseudo immersion

Answers

Answer:

Strategic Immersion

Explanation:

Strategic Immersioninvolves the player being intensely focused on winning the game and weighing all their actions in terms of maximizing their chances

You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need

Answers

Answer:

You will use a secure connection

Explanation:

You need VPN so that your IP cant be tracked which will help hackers to find you

A secured connection is a connection which is encrypted and secure the data from both the ends. A VPN (Virtual Private Network) is a secured connection.

What is Secured connection?

A secured connection is a connection that is encrypted by one or more security protocols to ensure the data security which is flowing between two or more ends.

A secured connection can help someone from stealing or changing information that has been sent online. To create a secured connection, the device and website's server use an SSL protocol. SSL protocol is a set of encryption rules that both computers understand and keep the data secured.

VPN stands for "Virtual Private Network". It is used for the opportunity to establish a protected network connection when using public networks. VPNs encrypt the internet traffic and disguise online identity of an individual. This makes it more difficult for third parties to track the activities online and steal data of an individual.

Learn more about Secured connection here:

https://brainly.com/question/25556545

#SPJ2

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

Write any four causes of cyber crime

Answers

A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

what is the most common size for footings for an 8 inch foundation​

Answers

Answer:

#4 rods at 12 inches o.c.

Explanation:

Angular when to use reactiveformsmodule.

Answers

Answer:

Image result for Angular when to use reactiveformsmodule.

In summaries, if forms are very important for your app, or reactive pattern are used in your app, you should use reactive forms. Otherwise your app have basic and simple requirement for forms such as sign in, you should use template-driven forms

Explanation:

Each form has a state that can be updated by many different interactions and its up to the application developer to manage that state and prevent it from getting corrupted. This can get hard to do for very large forms and can introduce a category of potential bugs

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

Diane changes the size of an image with the format picture pane and keeps the original ratio of height to width of the object. What has Diane done to the image?

chose D. she scaled, got 100%

Answers

Answer:

it's d.  

Explanation: post protected

I recorded a video on my windows PC, but when i tried to play it i got this message:

Windows Media Player cannot play the file. The Player might not support the file type or might not support the codec that was used to compress the file

is there a free online way i can fix this

Answers

Answer:

rename the file then type ".MP4" at the end and it should work

by the way big warriors fan as well

Explanation:

5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False

Answers

It looks like it should be true because I learned it from my dad

A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate the user is referred to as

Answers

Answer:

Identity Theft. i hope this helps :D

Daphne has determined that she has malware on her linux machine. She prefers to only use open-source software. Which anti-malware software should she use?.

Answers

Answer:

ClamAV is the open source antivirus you can in your Linux machine.

ClamAV is one of the best open-source anti-malware software for Linux machines.

What is malware?

Any program or file that purposefully hurts a computer, network, or server is known as malware or malware. Computer viruses, worms, Keyloggers, extortion, and spyware are examples of infection.

By analyzing all received packets to stop malware from being launched and infiltrating a computer, antiviruses can assist in preventing malware attacks. Antimalware software can also identify sophisticated malware and provide defense against ransomware assaults.

Hence "One of the top free anti-malware programs for Linux systems is ClamAV".

To learn more about malware,

https://brainly.com/question/22185332

#SPJ12

AI is not embraced everywhere in every industry because _______.

Answers

Answer:

See below:

Explanation:

AI is not embraced in every industry because of the type of industry and what it requires. In some situations, a human is needed since an AI cannot determine what to do and can sometimes even cause death.

AI isn't embraced everywhere because for some things we need a person, lets say for example, we need an AI to respond to 911 calls, that simply won't work due to the many situations and training the bot too will be a nightmare. For example, if a caller says a word that normal humans can understand, or a "code word" that every human knows but they haven't bothered to tell the bot, that will be the end of the line for them.

There are mutliple reasons to not use AI depending on the situation whether its life and death or just plain impractical.

true or false windows 98 and windows xp are examples of an operating system?

Answers

Answer:

true

Explanation:

shang chi Critique (6-8 sentences)

Answers

Explanation:

.......................

Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do

Answers

Answer:

bobo

Explanation:

If you want to share information with individuals who are internal to your organization, which type of network would you want to use

Answers

it is globe because I want a successful the all people

4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services offered by the publisher of the mobile OS in use on the device.

Answers

All mobile devices requires that end users have an account that is associated with services offered by the publisher of the mobile operating system (OS) installed on the device.

A mobile device can be defined as a small, portable, programmable electronic device that is designed and developed for the transmission and receipt of data signals (messages) over a network. Thus, a mobile device must be designed as a handheld device with communication capabilities.

Additionally, mobile devices such as smartphones have a mobile operating system (OS) installed on them, so as to enable them perform various tasks such as:

Taking pictures and creating video files.Typing and sending both text and multimedia messages.Browsing the Internet.Making both audio and video calls.

As a general rule, all mobile devices requires that end users have a registered account associated with the services offered by a publisher of the mobile operating system (OS) installed on the device. This registered account serves as a unique identifier and it connects an end user with the publisher of the mobile operating system (OS).

Read more: https://brainly.com/question/4922532

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in the theme. Which feature should she apply to modify the theme to her liking?

it's C. Theme variants

Answers

Answer:

c. Theme variants

Explanation: is correct. post protected

Answer:

C

Explanation:

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

Answers

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

Other Questions
why do u get to determain how many daily limits i can have u encourge alot of a ton people to buy you're vip for over priced prices it dum and so is youre app The janitor at a school discovered a leak in a pipe. The janitor found that it was leaking at a rate of 21 fl oz per hour. How fast was the pipe leaking in gallons per day? Five whole numbers are written in order.4 6 10The mean and median of the five numbers are the same.Work out the values of x and y. If point S ( 3, 4 ) is reflected across the line y=1, what are the coordinates of its reflections image? who was the first leader of the republic of texas? what is most likely the cause of this difference from the rest of the population Why was islam able to spread so quickly. Fix the one word that is used incorrectly.Kylie loves the outdoors so much that she would rather go camping then stayin a fancy hotel Question 2 of 4Drag the similes and metaphors from the story A Modern Cinderella into the correct boxes. 1.The sisters' eyes became narrow slits. 2.The Prince's mind raced like a galloping horse.3.The Prince fell into a dungeon of despair. a.He felt as if he were floating on a cloud.b.The sneaker seemed as big as a boat or as small as a seed.c.His discouraged heart was a cell phone in need of recharging.. . Similes Metaphors Question is on picture attached Which molecule is needed for photosynthesis to occur?glucoseoxygencarbon dioxidenitrogen Can anyone help me with this question? Ill give BRAINLIEST to whoever answers first What do you call raising a base to the exponent 2 What is the President's "Cabinet" and what is it's main job? The brain changes which contribute to addiction occur in parts of the brain called the;. Give one argument for and one argument against advertising prescription drugs. Learning Task 2: Solve each proportion1) 5/12 = 35/ n2) n/ 52 = 180/ 1203) 18/n = 21/284) n/4 = 24/65) 10/16 = n/56 Describe two important details about industrialization in Europe in the 19th century. soccer/ do/ play/on the weekend /you Twice a number plus eight times a second number is 19. Five times the first number plus seven times thesecond is 15. Find the numbers.Write two linear equations to represent a system to solve this, where X represents the smaller number andy represents the larger number. Write the equations, but do not solve them.