1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
10

Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these

Computers and Technology
1 answer:
Arisa [49]3 years ago
7 0

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

You might be interested in
The non-conditional boolean logical and operator is written as ____.
bixtya [17]
False because whhy would it be true. words of logic

3 0
3 years ago
Given a list of numbers, find the correct function to find the sum of the squares of only the positive elements.
vovikov84 [41]

Answer:

sqsum4

Explanation:

So to raise a number to a power in python, you can use the ** operation, which is usually confused with the ^, which is an operation, but it is not for raising numbers to a power. It is the xor bit operation, which if you don't know at the moment, it's fine, since it's not necessary for this. each of these lists uses a generation comprehension which is generally defined as: (x for x in object if condition) with the if condition being optional, but in this case it's necessary. If it's a bit confusing, you can define a generator using a function so it's a bit more spread out:

def generator(object):

   for x in object:

       if condition:

           yield x

Although in this instance were going to be performing some operation on x, which in this case is squaring it. So let's just look at the two functions that use the **, since they should be the only options that will be correct.

sqsum1(nums):

   This function does square x, except it uses incorrect syntax. The condition should come after the for loop. Python likely wont tell you this, because it may think you're trying to do something else. You can do one line if statements like this: a if condition else b, which will return a if the condition is true, and b if it isn't. So it may think that you're trying to do this one line if statement, and say that you're missing an else. The function could even implement in this way: <em>x**2 if x > 0 else 0 for x in nums</em>. This way if the x is negative it counts as 0, or in other words isn't counted towards the sum. But without this fix, the function will raise a syntax error

sqsum4(nums):

   This will square each number in x only if the current element "x" is greater than 0, or in other words positive. And then it returns the sum. So this function returns the expected output

5 0
2 years ago
Difference between RAM and CPU
frozen [14]

The main difference between the RAM and the CPU is the roles they play in a computer. The CPU is the actual part that does the computing while the RAM only holds the data.

4 0
4 years ago
Wireless networks usually use ____ signals to send data. user: a communications ____ determines how devices on a network communi
aev [14]
Laser signal is useto transmitted data
3 0
3 years ago
How can I call moderator in braily app ???
SVETLANKA909090 [29]

Hi

You can directly message them.

And just in case you don't know how to message in brainly, then:

If you are using app, then

• Go to your profile and go in the option followers/following.

• There you'll see an option to search, slick that and search the name of moderators.

• Do to there profile and you'll see 2 options ( given in image attached) 1, to follow and 2nd to message.

click \: the \: 2nd \: optionclickthe2ndoption

And just in case, you are using website, then:

• Go to their profile and you'll see an option saying " write a message", click that and you'll able to message them.

Just in case you don't know the names of moderators of Brainly ( you are new here)

So here are some of them:

• Siddhartharao77

• Nikki57

• Praneethworldtopper

• Anvigottlieb

• RehanAhmadXLX

• Abhi178

• Sugarplumprincess

Hope this helps!!!

Thanks...

☺☺

5 0
3 years ago
Other questions:
  • You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his works
    7·1 answer
  • This diagram shows some peripheral devices for a computer: which of the following is true
    7·1 answer
  • We can log on to computer or to network through s creen<br>​
    7·1 answer
  • During the analysis phase of the SDLC the systems analyst will decide how the hardware, software and network infrastructure, use
    5·1 answer
  • What is information associated with a document to help describe that document called?
    12·1 answer
  • Why is spyware more dangerous than adware
    5·1 answer
  • What is function of java​
    9·1 answer
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns hel
    12·1 answer
  • Need ASAP
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!