1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
11

When you build a computer from parts, you usually start by deciding on which processor and motherboard you will use?

Computers and Technology
1 answer:
loris [4]3 years ago
3 0
The thing to look for is compatible RAM, Processor and motherboard. Then I would choose my graphics card, hard drive, etc.
You might be interested in
Which is a requirement for searching for a template
Lina20 [59]

Answer:

umm... you did not discribe the anwsers, i cannot help you

8 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
ddd [48]

Answer:

A

Explanation:

4 0
3 years ago
Joe wants to use pictures from the Internet in a word processing program. Which is the most important aspect that Joe should con
IrinaK [193]

Answer:

B. Copyright

Explanation:

Joe needs to consider the Copyright as it is the legal means of protection of an author's work; it is the intellectual property that provides exclusiveness to the author's work, which menas that all the content and work created by the author, and protected by copyright cannot be used or published by anyone else without the consent of the author. For that reason, if the picture used by Joe has copyright it cannot be used in his project.

5 0
4 years ago
Read 2 more answers
Ill mark you the brainleist and give you 50 points if you wanna chat
tekilochka [14]

sure! what do you wanna chat about?

6 0
3 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • The opening of the throttle plate can be delayed as long as
    13·1 answer
  • Where would you go to cancel a print job?
    15·1 answer
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • How is the illusion of animation achieved using Sprites with multiple costumes?
    12·1 answer
  • What scheme is usually used today for encoding signed integers?
    5·1 answer
  • Python
    14·1 answer
  • Python
    5·1 answer
  • 6. When working with a file,
    9·1 answer
  • I need trash talk for a comeback:
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!