1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
3 years ago
8

Ebay employs the _____ auction mechanism.

Computers and Technology
2 answers:
scZoUnD [109]3 years ago
7 0

ebay employs the forward auction mechanism.

myrzilka [38]3 years ago
4 0

Answer:

A. Foward

Explanation:

You might be interested in
Can someone please help me with this
inessss [21]

the first question answer is true

the second question answer is true

please brainliest me i just took the test so i know those 2 answers are correct!

3 0
3 years ago
While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
choli [55]

Answer: D) Do an extensive web search to learn if it is a real virus.

Logical explanation: In the example, it is not a pop-up that you have a virus and instead an email that you have a virus. There is a very likely way that it could be a prank, scam, or a hacker.

Elimination explanation: If we look at all the answers:

A (Forward it to everyone in your address book) makes no sense, so A is eliminated.

Then with B (Forward it to your tech administrator) makes sense because if it was a real virus they may know what to do, but as my 'Logical explanation' explains, it may not be.

Finally with C, it's very irresponsible and should not be done. If it was a real virus there is a possibility it could be someone trying to steal information and more.

This leaves only option D left. :)

<h2><u>If this helped at all (or not), please remember to rate, thank, and mark brainliest as seen fit. Have a great day and stay safe! :)</u></h2>
4 0
3 years ago
A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network man
Ganezh [65]

Answer:

Network Operating System (NOS)

Explanation:

A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.

The NOS also acts as a network security because it could be used as an access control or even user authentication.

There are two types of NOS

1) Peer to peer network operating system.

2) Client/server network operating system

A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

4 0
3 years ago
When will your stony brook email address become your default or preferred email address for official stony brook communications?
Leona [35]

The stony brook email address will become the default or preferred email address for official stony brook communications as from Aug. 14.

<h3>What is the email about?</h3>

This is known to be the primary campus email address.

Note that it is the address that the University sends official email notifications and it is said to become the 'preferred' or the default or preferred email address for official stony brook communications as from Aug. 14.

Learn  more about a email from

brainly.com/question/24688558

#SPJ1

4 0
2 years ago
If, after fetching a value from memory, we discover that the system has returned only half of the bits that we expected; it is l
Ratling [72]

Answer:

Option c (byte alignment) is the appropriate alternative.

Explanation:

  • This same alignment problem emerges if another architecture does seem to be an application-specific byte, however, the design phrase set education seems to be greater within one byte. In these kinds of case scenarios, because when recovering a significance from people's memories the structure can come back less than half including its bits.
  • If memory access isn't synchronized, it seems to have been unevenly spaced. Recognize that even by interpretation, byte storage access has always been connected.

Some other choices aren't connected to the type of situation in question. So the above is the right option.

4 0
3 years ago
Other questions:
  • If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
    5·1 answer
  • The animation industry is solely reliant on 3-D modeling and 3-D virtualization to create the animated movies in the cinemas.
    9·2 answers
  • Which one is a correct answer
    12·2 answers
  • Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
    6·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • When would it be easier to use Cut and Paste over Drag and Drop? Explain?
    6·1 answer
  • The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease spee
    11·2 answers
  • Can someone plz explain me what this button does and I’m scared to click it
    11·1 answer
  • Which of the following commands appears in the INSERT menu or tab?
    10·1 answer
  • When does if(x==y) execute?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!