1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
15

PLZ HELP WITH SPEED i need the answer WILL GIVE BRAINLIEST

Computers and Technology
1 answer:
jeka57 [31]3 years ago
8 0

Explanation:

1. register-true

2. line spacing

3. before text

4. first line

You might be interested in
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Gaming applications allow users to play solo games as well as play with friends and/or other players
tankabanditka [31]

Answer:

True

Explanation:

i'm gamer

4 0
3 years ago
45, 78, 23, 12, 63, 90, 38, 56, 88, 15 Using the sequential search as described in this chapter, how many comparisons are requir
Alecsey [184]

Explanation:

By using the sequential search we find the following results.

  • The first key is 90 and its comparison number is 6.
  • The second key is 14 and its comparison number is 10.
  • The third key is 45 and its comparison number is 1.
  • The fourth key is 23 and its comparison number is 3.
  • The fifth key is 5 and its comparison number is 10.
8 0
3 years ago
Question 5
OverLord2011 [107]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is a Python function that generates random number between the given range. However, it includes the numbers that are given in the range.

So this function can generate a random number and return a number between 1 and 9 (inclusive 1 and 9).

The function is written below

...........................................................................................................

import random

print(random.randint(1, 9))

<em>#returns a number between 1 and 9 (both included)</em>

.....................................................................................................................

4 0
3 years ago
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
Other questions:
  • When creating wireframe geometry and the autocursor is on what happens when you push the shift key?
    13·1 answer
  • 61. Select an activity of the Production Phase: a. a web authoring tool is often used b. the graphics, web pages, and other comp
    10·1 answer
  • What dod regulation governs the use of commercial wireless devices within the global information grid?
    13·1 answer
  • Introduction to graphic design please help! Define the four terms: design ,art,decoration , and visual literacy. Describe how th
    12·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • Which symbol is used to identify edge-triggered flip-flops? a triangle on the clock input. the letter e on the enable input. a b
    14·1 answer
  • Why is information broken down into packets
    15·1 answer
  • What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
    5·2 answers
  • If the system has a mechanical advantage of 5 and the load of 350N.What effort is needed to lift the weight? Provide your answer
    10·1 answer
  • Please help me with this question<br>it on the picture​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!