1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
2 years ago
13

Which of the following is not an advantage of e-commerce for consumers?

Computers and Technology
2 answers:
Afina-wow [57]2 years ago
4 0

Answer:

c. You have little risk of having your credit card number intercepted.

Explanation:

Hope this helps

matrenka [14]2 years ago
3 0

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

You might be interested in
An information system can enhance core competencies by
Nutka1998 [239]

Answer:

An information system can enhance core competencies by: encouraging the sharing of knowledge across business units.

Explanation:

Hope this helps you ! please mark me brainless

4 0
2 years ago
What is analog computer? where is it used​
hichkok12 [17]

Explanation:

analogue computer is in computer which is used to process analogue data.

Analogue computer were widely used in scientific and industrial application

3 0
2 years ago
Read 2 more answers
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
2 years ago
4.which pre-defined feature is known as functions in Excel?<br> a.formula<br> b.property<br> c. data
lesya692 [45]

Answer:

I think formula?

Explanation:

8 0
2 years ago
This code is supposed to accept a word as input, and then print that word to the screen.
atroni [7]

The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

<h3>What is Coding?</h3>

This refers to the use of programming that is used to give instructions to a computer system

Hence, we can see that The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

Read more about coding here:

brainly.com/question/16397886

#SPJ1

3 0
1 year ago
Other questions:
  • Write a program that asks the user for the speed of a vehicle (in miles per hour) and how many hours it has traveled. It should
    5·1 answer
  • What is the main storage location of a computer
    13·1 answer
  • Drivers should scan 10-12 secound down the road looking of potential hazards
    5·1 answer
  • Which of the following best describes a good role model?
    6·2 answers
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    8·1 answer
  • What are some good digital habits?
    5·2 answers
  • What is the correct way to write h1 tag
    12·1 answer
  • Justine was interested in learning how to play the piano. She has successfully passed every level of music book and is planning
    10·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
  • Over the last decade, the overall energy consumption of cloud data centers worldwide has remained relatively the same. Why is th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!