1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
2 years ago
6

Security is a major concern with m-commerce. How can m-commerce software ensure the security of transmissions and that the trans

action is being made with the intended party
Computers and Technology
1 answer:
dimaraw [331]2 years ago
7 0

Answer:

Security in communication between applications and sites in m-commerce can use SSL technology.

Explanation:

While developing an app, developers have to perform several checks and ensure that the server has a legitimate certificate.

You might be interested in
Submit your 400-word essay that analyzes and evaluates three different examples of digital media. need some help
Vlada [557]

Answer:

Essay that analyzes and evaluates three different examples of digital media is described below in complete detail.

Explanation:

The 3 Types of Digital Media

  1. Owned Media
  2. Paid Media
  3. Earned Media
  • Owned media is what your label owns and manages. It doesn’t mean that you certainly own the program, but your corporation regulates the respective tales through which they publish their content about assistance and products.  
  • Paid media is considered attractive, and we’re all knowledgeable of it. It includes all marketing ways that a brand spends to get viewers. Here you spend a third-party program with specs on what you want.
  • Earned media is anything, whether content or remark, that stretches from another entity to help your brand. While most of it is optional, some expect you to contribute a substantial amount.

4 0
3 years ago
Mkdir() is the command in Java to create a new directory.<br> a) True b) False
svp [43]

Answer:

True.

Explanation:

mkdir() method in java is a part of the file class.The mkdir() command is used to create a new directory and it is denoted by the path name that is abstract.This function mkdir() returns true if the directory is created and false if the directory is not created by this function.

Hence the answer for this question is True.

8 0
3 years ago
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
The number of __________ to your website that had not visited prior to the time frame being analyzed.
liq [111]

Answer:

First Time Unique Visitor

Explanation:

I majored in

4 0
3 years ago
A cyber community is different than a physical community because _________________. A.people can go to restaurants to meet frien
jeka94
I believe the question is asking which of the options is true about a cyber community. In that case, only D is true, as a cyber community, such as facebook or instagram, gives you that ability. The rest of the options only apply to a physical community.
7 0
3 years ago
Other questions:
  • Write a for loop that iterates from 1 to numbersamples to double any element's value in datasamples that is less than minvalue.
    15·1 answer
  • Being nice take the points​
    9·1 answer
  • Question # 2
    7·1 answer
  • "Rights and duties are two sides of the same coin." Explain with examples​
    5·1 answer
  • The main part of your program has the following line of code.
    7·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • Which user interface part shows graphical output of mined data?
    8·2 answers
  • What does the following loop do? val = 0 total = 0 while (val &lt; 10): val = val + 1 total = total + val print(total)
    15·1 answer
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
  • what uses gps tracking to track vehicles? group of answer choices edge matching. cartography. automatic vehicle location. geogra
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!