1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
5

10. Question What are the drawbacks of purchasing something online? Check all that apply.

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
7 0

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

You might be interested in
How is the internet made?
sergey [27]

The Internet was made for shopping, searching. It was first made when the computers came out. (Windows Vista) Now you can watch videos or play games. The internet was main browsing and shopping. The internet today is really advanced and has made it was to phones and TVs. The internet wasn't the first thing you can do on the computer, you could write up a paper or do a slide show.

The Internet was created by Bob Khan and Vint Cerf. The Internet is like a big Tree. The websites are the bushes and the branches are the makers of the website. The internet today just a bunch of makers who make websites that you can access through the internet. If there were no websites there would be no internet. So if the internet quits (The Internet cant) Google and other big websites will be shut down. So the internet is a home for all the websites we use today.

This is really long but I tried not to make it so complicated and sound like I didn't copy and paste. I really hope this helped you in someway and Your Welcome. :)

8 0
3 years ago
Write algorithm to find (a+b)^2=(a+b)*(a+b)​
Masja [62]

Answer:

Basically

(a+b)^2 = a^2 + b^2 + 2ab

Explanation:

steps

       1: start

       2: read a value

        3: read b value

        4: c=(a+b)*(a+b);

        5: print  c value

         6:end

3 0
3 years ago
Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
Step2247 [10]

Explanation:

I would just say close the app and come back in after

7 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
Check all of the file types that a Slides presentation can be downloaded as.
GuDViN [60]

Answer:

.JPEG

.PDF

.pptx

General Concepts:

<u>Google</u>

  • Slides has an option to download a wide multitude of formats

Explanation:

If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.

Attached below is an image of the options.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which one of the following will not be considered as a microcomputer?
    12·2 answers
  • Commands are organized into tabs on the
    8·2 answers
  • Anybody know this question???
    6·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. B
    10·1 answer
  • Write a nested loop to set values as follows: [0] [1] [2] [3] [4] [0] 1 2 3 4 5 [1] 1 2 3 4 5 [2] 1 2 3 4 5 [3] 1 2 3 4 5
    12·1 answer
  • Retype the paragraph with the corrections. There are 12 corrections. Look closely at the word and letter highlighted in yellow t
    9·1 answer
  • What is the purpose of a project overview?
    8·2 answers
  • I need help now with YT
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!