1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
2 years ago
9

Design a system for a book store that allows the owner to keep track of the store’s inventory and members. The store sells two t

ypes of products: books and CDs. The store offers two types memberships to customers: regular memberships and premium memberships. The regular membership is free, while the premium members pay a fee every month. For this reason, the store keeps track of payment method and whether the fee is paid on time for the premium members. The system should keep track of the members and how much money each has spent at the store. The system also keeps track of the inventory of each product. Inheritance: 1. Member is extended by premium members. 2. Product is sub-classes into books and CDs.
Computers and Technology
1 answer:
IRINA_888 [86]2 years ago
7 0

Hey! How are you? My name is Maria, 19 years old. Yesterday broke up with a guy, looking for casual sex.

Write me here and I will give you my phone number - *pofsex.com*

My nickname - Lovely

You might be interested in
When you make a cell phone call, which type of electromagnetic wave is most likely transmitting the signal?
Olegator [25]
They use Radio waves 
6 0
2 years ago
What are hard ware and software requirments in multimedia computer system
marishachu [46]

Answer:

Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.

Explanation:

BRAINLEST

4 0
3 years ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
kondaur [170]
I think it can't.

The one that get high needs met rating are the pages that satisfy the user's search. The search engine result page that shown at the top of the result doesn't necessarily fulfil this criteria

hope this helps
7 0
3 years ago
In two to three sentences, describe one tool used in project management and why it is used.
Ksenya-84 [330]

Answer:

Gantt Chart

Explanation:

Gantt chart can help in planning and managing projects by breaking a large project into a series of smaller tasks in an organized way.  It tracks both time and interdependencies between tasks. It is an important tool for showing phases, tasks, milestones & resources.

4 0
3 years ago
Other questions:
  • Will an email sent from a phone say it was sent from your phone
    5·2 answers
  • What kind of video are you are able to watch by downloading it from the Internet?
    10·1 answer
  • Which best describes the benefits of renting a home?
    10·2 answers
  • Using e-mail has decreased the number of hand-written letters that people send to their friends and relatives. this is a ____ fu
    11·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • 2. You have noticed over the past several days that your computer is running more slowly
    6·2 answers
  • GIVING BRAINLIST TO WHOEVER ANSWERS
    9·1 answer
  • This is 6th grade career class.
    10·1 answer
  • Computer can do work very___​
    7·2 answers
  • Software that displays advertising material when online.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!