1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
12

The ________________ Act requires Internet sales to be treated in the same way as mail-order sales (e.g., collect sales tax from

customers residing in same state as business).
Computers and Technology
1 answer:
BARSIC [14]3 years ago
5 0

Answer:

Internet Tax Freedom Act

Explanation:

The Internet Tax Freedom Act was signed into law in 1998 by President Bill Clinton and has since been reviewed until the Permanent Internet Tax Freedom Act was passed into law on the 9th of June, 2015 by President Barrack Obama.

The Act requires that internet sales are equally treated as mail-order sales.

You might be interested in
Write a public static method diagSum, which takes a 2d array of int values as a parameter, and returns the sum of the elements i
saveliy_v [14]

A 2d array (i.e. 2 dimensional array) represents its elements in rows and columns

<h3>The program in Java</h3>

The method in Java, where comments are used to explain each line is as follows

//This defines the method

public static int diagSum(int[][] myArray) {

    //This initializes sum to 0

    int sum = 0;

    //This iterates through each row of the array

               for (int i = 0; i < myArray.length; i++) {

                   //This calculates the sum of the diagonals

                       sum+=myArray[i][i];

               }

               //This returns the sum

               return sum;

       }

Read more about methods at:

brainly.com/question/15969952

6 0
2 years ago
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
A slide show is another name for a PowerPoint presentation. <br> a. True<br> b. False
ruslelena [56]
It is true because a powepoint is a projecter

8 0
3 years ago
Read 2 more answers
4. What is the difference between portrait orientation and landscape orientation? (1.0 points)
Bezzdna [24]

Answer:

Portrait orientation is taller then it is wide, while landscape orientation is wider then it is tall.

Explanation:

3 0
3 years ago
What does the https in a link stand for?
ExtremeBDS [4]
<span>HTTPS stands for Hypertext Transfer Protocol Secure</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • A. True
    6·1 answer
  • Looking at your Personal Fact Sheet, do you see any areas that may need improvement? In which areas do you have the most room fo
    8·2 answers
  • Write down a recurrence relation for this version of QuickSort, and solve it asymp-totically. Show your work. Assume that the ti
    13·1 answer
  • Which of the following correctly describes the reason for quality customer service?
    15·2 answers
  • Respecting culture in the workplace means understanding that
    5·2 answers
  • Please help! i need to answer this soon!
    13·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.
    8·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!