1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
4 years ago
7

A bus topology network is most often deployed as a peer-to-peer network. a. True b. False

Computers and Technology
1 answer:
faltersainse [42]4 years ago
3 0
Idk the answer im sorry
You might be interested in
Which of the following is NOT a semantic reason for using header tags
Olegator [25]

Answer:

The correct option is;

C. They make text larger and bold

Explanation:

The semantic reasons for using header tags which are the benefits users derive from including header tags in content published on the web includes;

1) They give structure to the writing included in the document

2) Header tabs allow text to be broken into sections with different content in focus

3) Header tags are used to add key words to a page

4) To boost search engine optimization SEO

5) To improve visibility.

4 0
3 years ago
A ________ is an input device that responds to finger touch.
AURORKA [14]

1 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 21 - 3 2

6 0
3 years ago
Read 2 more answers
Which of the following Web sites would be MOST credible?
pentagon [3]
As of this problem together with the options presented with it, the most probable and the most likely answer for this would be A. a site associated with a local university.

An encyclopaedia site with many contributors can be prone to false information and made-up information. To add to it, some contributors might just be displaying the art of trolling over the internet and some might just be contributing just for the heck of it. A site run by a small, obscure publishing house can become more credible by becoming more renowned. A private site can either be good or bad, depending on the author that set it up. The most credible among the options would be a site associated with a local university.
6 0
3 years ago
The names of the governing body or organizationds that creates rules for information technology and information communication te
IceJOKER [234]

Answer:

Alliance for Telecommunications Industry Solutions

Explanation:

Alliance for Telecommunications Industry Solutions  is the main body that creates rules for information technology and information communication technology.

This agency create solutions to supports the release of new products and services into the communications marketplace. It also act as an agency that standardizes the  wireless and wireline networks activities. It is accredited by the American National Standards Institute (ANSI).

5 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Other questions:
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • The activities that gather information about the organization and its network activities and assets is called fingerprinting. __
    14·1 answer
  • You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi
    11·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • 2. How do cell phone users stay connected to the network as users move between cells?
    10·1 answer
  • (ORAL COMMUNICATIONS)- I just need someone to please check if my answers are correct, and if not, please correct me :)
    8·1 answer
  • Who is considered as the father of computer science?​
    11·1 answer
  • Diferencias entre ciencia y tecnologia
    5·1 answer
  • What are the four components of security documentation?
    9·1 answer
  • What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!