1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
4 years ago
13

Explain the look of a document which contains several different font sizes and font colors​

Computers and Technology
1 answer:
Firlakuza [10]4 years ago
8 0

Answer:

Colorful and dynamic?

Explanation:

You might be interested in
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
4 years ago
Opposite word of reassembling​
Marysya12 [62]
<h3>OPPOSITE WORDS OF REASSEMBLING</h3>

  • disperse
  • disband
  • separate
8 0
3 years ago
Read 2 more answers
An it department submits a purchase order to buy a new computer from a vendor. Which hardware lifecycle does this scenario belon
AnnZ [28]

Answer:

Purchase or Lease is the stage of the Hardware Lifecycle to which this scenario belongs to.

Explanation:

Stages of Hardware Lifecycle Management:

1. Plan

Plan is made to check which things are needed and will help us in short and long terms so, that it remains in budget and can give us more productivity.

2. Purchase or Lease

We do check whether we need to use the things for long term or short term. If long term we can buy it but, for short term we can always take it on lease.

3. Deploy & Install

New equipments are placed at required places for their usage.

4. Maintenance

We need to have maintenance service which are done by third-party companies so, that all equipments work smoothly.

5. Upgrade

We need our company to be efficient so, we do upgrade equipments like getting new version of it and to maintain that it work for long time.

6. Parts & Repair

If repairing of equipments are done it can serve for more longer time.

7. Extend

We can extend the equipments warranty period so, if any major component gets damaged it can get replaced or removed free of cost rather than spending extensive money.

8. Buyback or Trade In

We can sell the used equipments so, we can have extra money by which we have taken the work of equipment even and got price for it.

9. Dispose or Recycle

We should dispose or recycle after the time you realize it can't be used anymore or repairing it will be wastage of money. So, dispose or recycle it.

3 0
4 years ago
Match the job titles to the tasks
bija089 [108]

creates storyboards based on clients’ needs- Animator


assesses proposals for airplane designs to determine if they meet standards- Aeronautical engineer


uses special equipment and techniques to capture images- Commercial Photographer


creates software code, graphics, and multimedia elements for websites- Webpage designer

5 0
3 years ago
Read 2 more answers
Other questions:
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • Which of these pieces of hardware is used for telecommunication
    12·2 answers
  • Question B_1 (15 points) Please define (describe) local variables and how they are used in computer programming ( e.g. In C, C )
    6·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    6·1 answer
  • This type of headline sits next to a story.<br> Banner<br> Slammer<br> Hammer<br> Sidesaddle
    8·2 answers
  • Is this very epik or not?
    9·2 answers
  • if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should yo
    6·1 answer
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!