1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
4 years ago
8

In the context of a global information system (gis), _____ offer electronic data interchange standards, encryption, secure e-mai

l, data synchronization, and other services to conduct international business.
a. human-powered networks
b. value-added networks
c. crawler-based networks
d. brick-and-mortar networks
Computers and Technology
1 answer:
11Alexandr11 [23.1K]4 years ago
8 0
Answer is (B) Value-added networks.

A van is a private network provider hired among online companies that facilitate EDI (Electronic Data Interchange) or other network services such as message encryption, securing mail, and management reporting. A Value Added Network provides an easy way for ecommerce businesses to share data and communicate securely.






You might be interested in
Which three options below describe typographic hierarchy?
Korvikt [17]

The three options that describe the typographic hierarchy are given below:

  • The importance of information is shown through the text.
  • The presentation of the text in terms of structure.
  • The placement of the text defines its flow and hierarchy.

Thus, the correct options are A, B, and C.

<h3>What is Typographic hierarchy?</h3>

Typographic hierarchy may be characterized as an approach that utilizes typography: the size, font, and layout of distinct text components to produce a hierarchical division that can authenticate users where to look for specific information.

The purpose of using this methodology is to focus on the main points of the article accordingly. It increases the sense of understanding of the readers with focus.

Therefore, it is well described above.

To learn more about Typographic hierarchy, refer to the link:

brainly.com/question/12076206

#SPJ1

3 0
2 years ago
__________ can collect information about credit card numbers.
saveliy_v [14]

Answer:

<h3><u>Spyware</u></h3>

  • Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses. Adware displays pop-up advertisements when you are online.

Explanation:

<h2>Hope this helps !! </h2>
5 0
2 years ago
Read 2 more answers
Can someone answer this for me will award brainliest lol
Natasha2012 [34]

Answer: Without GUI's being developed, we most likely would still be using terminal systems. Terminals require command/text input rather than mouse or  other input. The invention of GUI's enabled people to use simpler input methods, rather then clunky text input systems. To sum, GUI's simplified the computer experience as we know today.

Hope this helped :)

6 0
3 years ago
Read 2 more answers
What is the function of a header when writing HTML
marusya05 [52]
The Function of a header is that it makes your TEXT LOOK BIGGER

5 0
3 years ago
Which technology can be implemented as part of an authentication system to verify the identification of employees?
STALIN [3.7K]
The answer is smart card readers. Smart card readers can be implemented as part of an authentication system to verify the identification of employees.
5 0
2 years ago
Other questions:
  • Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
    10·1 answer
  • When was internet created in which year​
    13·2 answers
  • Your task is to write and test a function which takes one argument (a year) and returns True if the year is a leap year, or Fals
    5·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • JAVA
    5·1 answer
  • Why do attackers tend to target public or private Wi-fi networks?
    10·1 answer
  • WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME
    8·2 answers
  • What would provide structured content that would indicate what the code is describing ?
    6·1 answer
  • True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!