1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
4 years ago
12

All of the following are basic functionality provided by e-commerce merchant server software except: Question 22 options: A) pro

ductivity software. B) a product catalog. C) a shopping cart. D) credit card processing.
Computers and Technology
1 answer:
UNO [17]4 years ago
4 0

Answer:

The correct answer is option A "productivity software"

Explanation:

An e-commerce merchant server software is a software that enables sales exclusively over the Internet. It is a software that connects to a company server with the aim of allowing sales of the company's products to take place over the internet. Here, sales are capped with customers even paying for what they purchase online.

A product catalog in an e-commerce merchant server software shows lists of essential products that buyers can purchase online. These lists include product features, price, color, brand, size, and so many other examples.

A shopping cart is some sort of functionality in eCommerce software used to collect the items potential buyers select online with the aim to make it easier for the buyers to see all the items selected after shopping, make necessary adjustments if need be before payment.

Credit Card processing allows e-commerce merchant server software make buyers get card payment options to get their payment processed. In the authorization stage, the merchant must obtain approval for payment from the issuing bank. Some banks would require their client to activate this payment option with them at the bank before such clients are allowed to do e-commerce payments.  

The correct answer is productivity software because it is a software used for producing information that shows the productivity of a particular group, persons. In other words, productivity software can help produce things that simplify productivity they include worksheets, graphs, digital videos, and so many other examples.

You might be interested in
• Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment a
kobusy [5.1K]

Answer:

10

Explanation:

i don't know please just thank me

8 0
3 years ago
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
mote1985 [20]

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

3 0
3 years ago
WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of
gayaneshka [121]

Answer:

Hacktivists

Explanation:

Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.

5 0
3 years ago
A single line text input control with an initial value as +971
Nezavi [6.7K]

Answer:

What's about this initial value equal to 971

Explanation:

\sqrt{2}

8 0
3 years ago
What is the launching of a 3-D map called?
WARRIOR [948]

Answer:

A raised-relief map or terrain model is a three-dimensional representation, usually of terrain, materialized as a physical artifact.

Explanation:

<h2>P I E C K</h2><h2>_______</h2>
8 0
3 years ago
Other questions:
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • What are short handled screwdrivers used for?
    12·1 answer
  • Wats is a internal disk drive​
    10·2 answers
  • M f2.app.edmentum.com
    5·1 answer
  • 6.13: Word Count
    15·1 answer
  • "In a web app, where is data usually stored? A. Mobile network B. Application storage C. Local computer D. Cloud storage"
    14·1 answer
  • To apply the StartSafe philosophy to preventing workplace violence, what are the three steps to follow? A. Plan for your job req
    12·2 answers
  • What is the difference between a switch and a hub?
    8·1 answer
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!