1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Drupady [299]
3 years ago
5

List any four e-commerce website​

Computers and Technology
2 answers:
Sphinxa [80]3 years ago
6 0

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

Ipatiy [6.2K]3 years ago
5 0

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

You might be interested in
What is your biggest takeaway on that subject?​
tester [92]

Hi. You have not informed the subject to which this question refers, which makes it impossible for your question to be answered. However, I will try to help you as best I can.

The only way to answer this question is to evaluate the media where the subject in question is being presented. Thus, you must understand this subject, whether reading a text about it or watching a video about it, the important thing is that you understand it and absorb all the teachings it is capable of transmitting.

In this case, you need to evaluate all these teachings which was the most important for you and which represented a very important lesson in your life. This lesson will be the biggest takeaway you've achieved with this subject.

3 0
3 years ago
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
2 years ago
Which two editions of Windows 7 support 64 bit CPUs? Choose two out of Professional, Business, Starter, or Home Premium.
Tju [1.3M]
Home premium, professional
6 0
3 years ago
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Assuming that the message variable contains the string "Happy holidays", the statement message.find("days"); returns a. -1b. 10c
katrin [286]

Answer:

Answer is b. 10                

Explanation:

The find() method is used to search the string for a specified value and searches the first occurrence of that value. It returns the position of that specified value. If the value is not found, this method returns -1.

Lets say we have a message variable that contains the string Happy holidays.

message = "Happy holidays"

We use the method find() to find days word from the Happy holidays string in the message variable.

The find() method will find the position of day.

If we look at the string Happy holidays we see that the word day is at the 10th position of the string.

H     1

a      2

p      3

p      4

y      5

h      6

o      7

l       8

i       9

d      10

a      11

y      12

s      13

So it is at 10th position so the statement

message.find("days")

returns 10

7 0
3 years ago
Other questions:
  • What does limited access to a document mean?
    14·2 answers
  • An ethernet switch has a ____ table which is updated by ______.
    14·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • WHAT THE DEFINITION OD ENGINEER. No CHEAT
    5·2 answers
  • David owns a retail business that just implemented a web app to supplement sales. He needs to choose an attribution partner to i
    15·1 answer
  • What does an operating system do?
    12·1 answer
  • The most important hardware device for connecting supercomputers over a wide area
    10·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • When does the following while-loop stop running?
    10·1 answer
  • Um ok that makes sooo much sence
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!