1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
14

Analyze a software application that enables people to purchase prescription drugs on the internet. briefly describe this applica

tion's impact on employment, customer service, crime, privacy and errors.
Computers and Technology
1 answer:
stiv31 [10]3 years ago
8 0
This question makes no sense
You might be interested in
g What differences do you anticipate there being between working inside vs outside City government in data and digital services?
Ivanshal [37]

Answer:

The work with city government is better than outside city government due to the reasons given below.

Explanation:

There are many differences while working in city government or outside city government. I choose city government job in data and digital service due to the following reasons.

  1. City government provides all types of facilities that are required in data management and digital services.
  2. Provision of more benefits along with salary from city government.
  3. City government arrange different training and development sessions for their employ.
  4. There are many learning and development opportunities, because they provide opportunity to work in different departments.  
  5. City Government have better HR policies as compared to outside government.
6 0
3 years ago
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
3 years ago
What is the name of the output devices of an computer?
alexandr402 [8]
Printer,speaker,head phones,monitor
3 0
3 years ago
Game Design Help please
valina [46]
This game on cool math
4 0
3 years ago
Any information that is processed by and sent out from a computer or other electronic device is considered __________.
wel

Answer:

Your answer will be output.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
    5·2 answers
  • How will you create an email id
    11·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • What pointer appears when pointing to a hyperlink?
    9·1 answer
  • When using a calculator be sure to press ____ first.​
    14·2 answers
  • Which of the following contributes to your active digital footprint
    12·2 answers
  • Choose the parts of the browser window. PLEASE ANSWER QUICKLY TEST
    12·2 answers
  • Where do you place the logical test argument in an IF function formula?
    6·2 answers
  • A _____ is a computer that is deliberately set up to be easily hacked into.
    10·1 answer
  • Convert 12 bits to bytes​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!