1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
2 years ago
15

There are four ways to create a macro? FALSE OR TRUE

Computers and Technology
2 answers:
Murljashka [212]2 years ago
7 0

Answer: True

Explanation:

There are actually four ways to create a macro. You would want to use %let.

Sidana [21]2 years ago
5 0
Answer:

There are five ways to create a macro. (False)




You might be interested in
What type of formatting does the clip below demonstrate
Alex17521 [72]

In order to answer the question i would need a screenshot of the clip.

5 0
4 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
At Moore High, 456 students attended the prom. This is 65 more students than
wlad13 [49]

Answer:

B-15%

Explanation:

5 0
3 years ago
Read 2 more answers
Which address correctly represents one that is composed of two halves, one assigned to a network adapter manufacturer, and the o
Vlad1618 [11]
 Media access control address
5 0
3 years ago
Other questions:
  • Why do nonprofit agencies include blogs on there website?
    10·1 answer
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • I am on windows 10 OS. I have been trying to figure this out for ages! I want to get my task bar (on the bottom of the screen) t
    14·2 answers
  • A page-ranking algorithm ranks web pages according to
    15·2 answers
  • The Presonus Studio Live 24 console has analog D-sub direct outputs. What cable would you need to connect this to a HD Analog in
    15·2 answers
  • By recording where a hockey puck goes into a net, a goalie can...
    8·2 answers
  • Algoritmos para llevar a cabo una actividad
    15·1 answer
  • Who want a rap song if yes try to rap too this Can you move it like this? I can shake it like that
    10·2 answers
  • Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False Pr
    7·1 answer
  • What is a fundamental difference between the SAP platform and the AirBnB platform?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!