1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
8

_ is a term used for license like those issues by creative commons license as an alternative to copyright

Computers and Technology
1 answer:
Rufina [12.5K]3 years ago
4 0

, . , .

Explanation:

<h3> ' </h3>

You might be interested in
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
olga2289 [7]

Answer:

Start

Input n, 2

Calculate if (n%2==0) then is divisible else not divisible

Output number is divisible or not

Stop

Explanation:

3 0
3 years ago
After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie
Aneli [31]

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

3 0
3 years ago
Can i stream videos from my phone to my android tv
OLEGan [10]
Yes, if you purchase an adapter that you plug into your phone that goes to the hdmi port on the tv. Hope this answered your question- eagle.
4 0
3 years ago
Use the drop-down menus to complete the statements.
damaskus [11]

Answer:

data source

copied and pasted

Explanation:

corctEdgbuz

5 0
3 years ago
Other questions:
  • Match the following tasks with their appropriate timing.
    8·1 answer
  • What do you need for digital photography?
    14·1 answer
  • I need help with Microsoft.
    6·1 answer
  • The transmission control protocol (TCP) layer helps computers to communicate in which of the following ways?
    9·1 answer
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • Create a DisplayBox application that prompts the user for a height and width and then displays a box of that size. The DisplayBo
    8·1 answer
  • What age group is currently experiencing the most growth in terms of social media use? 12 and under 18-25 34-40 55 and over
    7·1 answer
  • Which statement about bump mapping and normal mapping is true?
    9·1 answer
  • Do you think<br> brain uploading<br> is a good idea?
    7·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!