1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
12

Which key must you press after you write into a cell?

Computers and Technology
1 answer:
fiasKO [112]3 years ago
6 0
Hit the return key after you type in a cell
You might be interested in
Consider the following business environment.
ale4655 [162]

Answer:

Check the explanation

Explanation:

C-> OLAP systems allow users to analyze database information from multiple database systems at one time. The primary objective is data analysis and not data processing.

D-.Airlines use the Data Mining Techniques to improve Customer Service.

Kindly check the attached image below to see the step by step explanation to the question above.

7 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
Taya2010 [7]

Answer:

The answer of this question is described in the explanation part.

Explanation:

  • The connection operator will substitute unresolved conceptual addresses with the real addresses aligned with either the end system decimal parameters.
  • To do this, the modules should keep records of directives which relate to ambiguous signals.
  • In the relating, each configuration in the application framework binary is assigned a pattern of domain names.
  • This has been done, problematic connections to objects imported by this unit may be substituted in other frameworks because each other system would contain the set of instructions to be repaired for.

7 0
3 years ago
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
4 years ago
¿Cuál es el objetivo principal de los servicios?
sleet_krkn [62]
Ayudar a las personas que los contratan
8 0
3 years ago
Other questions:
  • A navigation device that transfers packets of data between two or more networks is called a _______
    12·1 answer
  • Netbooks, also called mini notebooks or subnotebooks, are a subgroup of desktops.<br> True<br> False
    12·1 answer
  • Which person would be the best fit for a career in the information technology field?
    14·1 answer
  • NEED ASAP!!
    14·1 answer
  • Computer trespass can be harmless.<br> a. True<br> b. False
    15·2 answers
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
  • What starts with p and ends with orn
    15·2 answers
  • A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.
    13·1 answer
  • The sum of these 9 numbers is 36. 2, 2, 6, 2, 1, 8, 7, 5, 3 What is the mean of these 9 numbers?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!