1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
12

A USB device used to transfer photos from the memory card to a hard drive is called a _____.

Computers and Technology
1 answer:
svetlana [45]3 years ago
3 0
A flash drive. It stores pictures that can be transferred to your hard drive on a laptop, computer, etc
You might be interested in
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
What is ment by creative middle way solution
SOVA2 [1]
Looking for a way to resolve conflicting values that comes as close as possible to satisfying all relevant obligation
7 0
3 years ago
What is a taskbar?
shutvik [7]
To me, the answer would be A menu that list options available in a particular program.
Because, It a list of instructions you can make your computer do like copy, paste, and print.
4 0
3 years ago
The equipment that processes data in order to creatte informatin is called the -----
Greeley [361]

Answer: Hardware

Explanation: physical equipment that processes data in order to create information is called the Hardware.

6 0
3 years ago
Program kalkulator menggunakan bahasa pascal dan pake dua statemen
Hunter-Best [27]
What language is this???  Could you ask in English?
4 0
3 years ago
Other questions:
  • What machine is considered by many to be the first all-programmable electronic digital computer?
    15·1 answer
  • What are the only things that can be declared in an interface?
    11·1 answer
  • Python Question: write a program that generates a random number in the range of 1 through 100, and asks the user to guess what t
    8·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Once you create a slide show, it is not easy to rearrange things, so you should plan your presentation ahead of time.
    14·1 answer
  • When an object is created, the attributes associated with the object are called: A. instance fields B. instance methods C. fixed
    11·1 answer
  • If we live 4000 meters from the fire hydrant, how many kilometers away do we live?
    6·2 answers
  • HELP
    11·1 answer
  • Which of the following describes all illustrations created by freehand?
    15·1 answer
  • A clearly stated objective that how program should work and how it respond to a error is called??
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!