1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
12

. When would one use the analytic application fraud detection?

Computers and Technology
1 answer:
vaieri [72.5K]3 years ago
4 0

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

You might be interested in
Write a program that reads numbers from the user until a blank line is entered. Your
ddd [48]

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

5 0
2 years ago
The correct or acceptable way of communicating on the internet is known as
stepladder [879]
I want to say e-mail.

8 0
3 years ago
The ________ of the operating system enables the user to communicate with the computer system. Select one:
mojhsa [17]
The user interface (correct answer is a)
8 0
3 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
1
diamong [38]

Answer:

DHTML (Dynamic HTML) is a collection of a few different languages

Explanation:

Dynamic HTML is a collection of HTML, DOM, JavaScript, and CSS.

It allows for more customizability than regular HTML. It allows scripts (JavaScript), webpage styling (CSS), manipulation of static objects (DOM), and building of the initial webpage (HTML).

<em>Since the question is incomplete, I'm not really sure what all you need answered - please leave a comment if you would like something else explained. :)</em>

3 0
3 years ago
Other questions:
  • Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on
    7·1 answer
  • "which part of an information system consists of the rules or guidelines for people to follow?"
    9·1 answer
  • Cell division is called:
    7·1 answer
  • The data in a data warehouse have which of the following characteristics?
    13·1 answer
  • On most computers, the default font size in Word is ____. 8 11 14 16
    6·1 answer
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • Hey yall! Its spoopy season! I am having a live stream on the Spoon app under the username teendragonqueen️‍ if yall wanna join!
    11·2 answers
  • A cell reference in a formula allows you to point to another cell location
    8·2 answers
  • Dante needs to query a table to find all the references to a particular product and apply a 10%
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!