1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
4 years ago
13

URGENT!!!

Computers and Technology
2 answers:
MArishka [77]4 years ago
7 0

if im not wrong i guess its false

Alona [7]4 years ago
5 0

False is your answer

You might be interested in
What are comments meant to do?
docker41 [41]
Comment<span> (computer programming) ... In computer programming, a </span>comment<span> is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters.</span>
8 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
You need to install an RODC in a new branch office and want to use an existing workgroup server running Windows Server 2012 R2.
klio [65]

Answer:

You should do the following:

  • Create an account of computer for RODC in the domain controller OU (Organizational unit) as well as allow the Micheal's account to join the computer to the domain.

Explanation:

RODC:

It is called as Read only domain controller that is used to ensure the protection of the servers at remote offices of an organizations.

  • In this case, you are installing an RODC in a new branch office that is remote. For installation of RODC on windows server 2012 R2, we need to create an account for the computer in the domain controller organizational unit for the installation of RODC.
  • We also need to create an account for Micheal's with the privilege to join that computer to the domain.

5 0
3 years ago
How can social media be useful for brand awareness ?
shutvik [7]
It lets them reach out to people on that platform that can advertise their products
4 0
3 years ago
Can someone please tel me what switches are in my keyboard? I know they are blye byt what brand?
AlladinOne [14]

Answer:

a s d shift and z and cap lock  if you meant the keys

Explanation:

3 0
3 years ago
Other questions:
  • List five characteristics of a series circuit
    9·1 answer
  • Changing the color of my avatar using a computer program is ok since it doesn't impact anyone else
    12·1 answer
  • Write a function that iteratively appends random 1's and 0's to an array to form a binary number. The function returns the binar
    13·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • What is this effect in photoshop or photography?
    12·2 answers
  • A tax return preparer, routinely publishes a schedule of the fees she charges her clients. For how long must keep copies of the
    7·1 answer
  • What role/service is windows 2012 server backup part of?
    5·1 answer
  • 4.2 Code Practice: Question 2​
    14·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • What is the name of tool in number 9 picture? CAPITAL LETTER ONLY
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!