1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
11

Explain any two computer technologies that has improved e commerce

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
6 0
1- AI and chatbots for customer communications -

Artificial Intelligence plays an important role in everyday life, having a major impact on how we live and work. There are several examples of AI and automation tools with customer service applications for your business, including voice-powered assistants such as Apple’s Siri, Google’s home and Amazon Echo. Research shows that 45% of millennials are already using this type of voice activated search for online shopping.

Chatbots and virtual assistants represent the future for businesses. Some are already integrating chatbots in their systems to improve their customers’ experience and boost brand image.

With the help of Chatbots you can order food, check in luggage at the airport, book a hotel room, schedule your flight, and get recommendations for almost anything you can think of. The Starbucks chatbot for example gives customers details regarding their order status, payment details etc.

2- Image search-

Ecommerce businesses are integrating image search technology on their websites so customers can easily photograph products they are interested in and find similar examples on other sites that may be offering better deals.

Imagine someone sees a beautiful couch, but it costs too much for them. If your business offers similar products at a more reasonable price, integrating image search into your website will allow you to potentially pick up on this sale, creating an extra revenue stream.
You might be interested in
For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
lubasha [3.4K]

Answer:

D. End-User Programmer.

Explanation:

A stack data structure is used to holds data for programs. The first data to go into a stack is always the last to be extracted (First-in-Last-out). Data is read into the stack with the push function and retrieved with the pop function.

When the stack is empty, it means there are no data left to pop from it. If a pop function is issued at this time, the program conventionally throws an error, there is no need for the end-user to write an exception handler for it because the end-user programmer has done that already.

4 0
3 years ago
A student is curious about how a Web site appears on his computer screen. On a piece of paper,
nata0808 [166]

A student is curious about how a Web site appears on his computer screen. There is a communication between the client and the server in the Application Layer.

Explanation:

  • When we choose to open a webpage (in any browser) the seventh layer of the OSI model - called Application layer will help to do that.
  • What happens after we write the webpage address in address bar is that the Application layer protocol (also called HTTP) formats and sends the request from the client's browser (Internet Explorer, Mozilla Firefox , Opera, Safari etc.) to the server.
  • It also formats and sends the server's respond back to client's browser. This process happens very fast and all the OSI model layers are processing in it (not only the Application layer).
  • All the layers are working together and each of them is responsible for some particular job, but all together they work as one. The layers communicate with each other and in case of error they will retry and fix the error or if they are unable to do it, the responsible layer will inform the user about the source of the problem.
  • What happens when page is requested and received? If we will remove the graphical and visual image and look at the process that computer does. We will see a set of commands, mathematical algorithms, symbols, letters and not understandable codes and processes.
  • When data is sent from "A" to "B", a transport layer is responsible to send and deliver it correctly and exactly the same, what was requested.
  • If the request, processed by "A" (sender) is too long, the transport layer will divide it in segments (called segmentation process) to understand well and not make a mistake while sending the data to "B" (recipient). After this process data is travelling through the network to the "B" (recipient), if the sent data is segmented or divided, the transport layer is responsible for reassemble it again and "B" (recipient) receives its requested data (It can be web page or other data).
  • If the transport layer will not do the segmentation process, then the next - network layer - will check the data and if the requested message is too long it will fragment it (called fragmentation process) and will provide the same as transport layer had to do.
  • All the layers processes are connected to each other and work cooperatively.
5 0
3 years ago
Role of User Defined Iprms for creation of paten
Mazyrski [523]

Answer:

3

Explanation:

3 0
3 years ago
Write a class named Car that has the following data attributes: __year_model: (for the car's year model) __make: (for the make o
rewona [7]

Answer: Provided in the explanation section

Explanation:

Provided below is the program to carry out this task, i hope you can follow it clearly.

Program is run below

class Car:

   def __init__(self, model, make):

       self.__year_model = model

       self.__make = make

       self.__speed = 0

   def accelerate(self):

       self.__speed += 5

   def brake(self):

       self.__speed -= 5

   def get_speed(self):

       return self.__speed

car = Car("F1", "Ferrari")

for i in range(5):

   car.accelerate()

   print(car.get_speed())

for i in range(5):

   car.brake()

   print(car.get_speed())

cheers i hope this helped !!

7 0
4 years ago
IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else.
WINSTONCH [101]

Answer: A) Direct TTL probes technique

Explanation:Direct TTL probe technique that is technique that is used when the attacker is accessing from any smaller part of IP address that is known as subnet. This technique is successful because it sends the packet to the particular host and time to live(TTL) of the return message is not equal to the packet checking processing, then the IP spoof is present in the packet.

Therefore, the correct option is option(A).

4 0
3 years ago
Other questions:
  • All web traffic is based on the ____________________ protocol.
    14·1 answer
  • Research information technology affects on job market, career pathways, occupational outlooks in business and finance and synthe
    7·1 answer
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • How many different passwords are possible if each character may be any lowercase letter or digit, and at least one character mus
    6·1 answer
  • List an example of application software used in spreadsheet​
    11·2 answers
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
  • What's the best thing that's happened to you during quarantine?
    10·2 answers
  • I don't understand this
    10·1 answer
  • hello fellows i need a help.Ineed to know about computer evolutions and computer generations.please hurry.Its my rankover questi
    10·1 answer
  • What do you think is the most effective way to ensure that code adheres to good coding standards.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!