1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
6

Consider an online shopping portal that allows a customer to browse and purchase different products. There are distributed store

s and customers are of different countries and religions. The products are arranged under different categories like Books, Computers, and Electronics, etc. Only a registered customer can order a product from this portal. Each registered customer will have his own shopping cart. He can view, add or remove products in his shopping cart and view his total bill. The final cart is submitted for payment and details like shipment address are confirmed by the customer. The customer is confirmed with a shipment id and delivery of goods within 15 days. Once the customer finishes selecting the product/s, he can view the cart and then place the order by providing details like postal address, number of items, etc. The website is managed by an Administrator. An administrator can add, remove and update categories, products under each category, their price, and quantity. He can also remove or verify the customer.
Draw a sequence diagram for online shopping portal scenario.
Computers and Technology
1 answer:
andrezito [222]3 years ago
8 0

Answer:

Design a web page that automatically tracks the location to determine the language

Explanation:

You might be interested in
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
In linear​ programming, choices available to a decision maker are called
Aleks [24]
Havinh=g the software to do it all

6 0
3 years ago
Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
Arlecino [84]
I've never heard of a group account so I'm going with.
C. Group
5 0
4 years ago
What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
Anuta_ua [19.1K]

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

5 0
3 years ago
Assume that x is a variable that has been declared as an int and been given a value. Assume that twice is a method (in the same
Anastasy [175]

Answer:

Arrays are indexed from 0 in pretty much every language, except stupid Microsoft languages.

Lets say that ARR_SIZE is 5 for example.

So you have an array of 5 elements. They are indexed from 0 - 4.

arr[0] // First element

arr[4] // Last element

Therefore arr[ ARR_SIZE -1 ] is the last element of the array.

That's why for loops to iterate through arrays are wrote like:

for(int i = 0; i < ARR_SIZE; ++i)

4 0
3 years ago
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • The ____ statement is used to execute specific programming code if the evaluation of a conditional expression returns a value of
    10·1 answer
  • Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to
    14·1 answer
  • Exactly how thin is the air in outer space?
    10·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supporte
    6·1 answer
  • True or False (1 point each)
    9·1 answer
  • Stages of reverse engineering
    8·1 answer
  • Write a program that will input miles traveled and hours spent in travel. The program will determine miles per hour. This calcul
    5·1 answer
  • How do I mark brainlyist
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!