1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Slav-nsk [51]
3 years ago
6

Consider an online shopping portal that allows a customer to browse and purchase different products. There are distributed store

s and customers are of different countries and religions. The products are arranged under different categories like Books, Computers, and Electronics, etc. Only a registered customer can order a product from this portal. Each registered customer will have his own shopping cart. He can view, add or remove products in his shopping cart and view his total bill. The final cart is submitted for payment and details like shipment address are confirmed by the customer. The customer is confirmed with a shipment id and delivery of goods within 15 days. Once the customer finishes selecting the product/s, he can view the cart and then place the order by providing details like postal address, number of items, etc. The website is managed by an Administrator. An administrator can add, remove and update categories, products under each category, their price, and quantity. He can also remove or verify the customer.
Draw a sequence diagram for online shopping portal scenario.
Computers and Technology
1 answer:
andrezito [222]3 years ago
8 0

Answer:

Design a web page that automatically tracks the location to determine the language

Explanation:

You might be interested in
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
What is the purpose of a report?
Tanzania [10]
C to organize data in a table
4 0
3 years ago
Enumeration can be used to discover all but which of the following types of information?
Ostrovityanka [42]

Answer:A)Smart-card PINs

Explanation: A pin is the defines as the personal identification number that is allotted to the smart card uniquely that is no other smart can have same number.This number is only known by the smart card holder only.

This number is important because it works for the unlocking of the data that is securely stored and by entering the pin ,it can be decoded.Thus, the other given options are incorrect because they don't use enumeration to hide the data .Thus the correct option is option (A)

3 0
3 years ago
Insert the appropriate functions in the Summary Statistics section of the worksheet: cells H18:H22. Format the payments with Acc
liberstina [14]

Answer:

Explanation:

If we want to insert the appropriate functions, we can know the operation, for example, it could be a sum, multiply, average or only divide, but if we want to apply for a format number like accounting number, we must go to the tab home and the section number, we can change the format number, an accounting or even text format.

8 0
3 years ago
What does project manager do?
lapo4ka [179]
Project managers (PMs) are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.
7 0
3 years ago
Other questions:
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • You are creating a budget for your new business.What should you include
    15·1 answer
  • Modify the list according to the following: append the smallest value at the end of the list when all numbers in the list are ne
    14·1 answer
  • You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard a
    10·1 answer
  • How has the use of computers impacted business
    13·2 answers
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • Discuss the DMA process​
    11·2 answers
  • Explain the different features available in Print command?
    10·1 answer
  • Why can videos be streamed from the cloud to a computer with no loss in
    5·2 answers
  • Discuss why diffrent user interface require the use of diffrent type of input device<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!