1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
10

Consumers who wish to make a purchase from other consumer on ebay need tl

Computers and Technology
1 answer:
il63 [147K]3 years ago
8 0

Answer:

Bid on item

Explanation:

Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.

When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.

You might be interested in
Middleware for cloud database applications is commonly written as ____—short sections of code written in a programming or script
Ostrovityanka [42]
<span>Middleware for cloud database applications is commonly written as scripts—short sections of code written in a programming or scripting language that are executed by another program. A script language is used for server side scripting language that can change a specific data on the server. Examples of these are PHP, JSP, Perl, Python, etc.</span>
5 0
4 years ago
Ssl/tls provides security ________. a. between the sender and his or her e-mail server b. all the way between the sender and the
Brrunno [24]
SSL <span>stands for Secure Sockets Layer and TLS stands for </span>its<span> successor Transport Layer </span>Security. They are protocols responsible for encryption and authentication and are  application-layer protocols. SSL/TLS provides security all the way between the sender and the receiver, which means also between the sender and his or her e-mail server . Correct answer: c. both a and b.
7 0
3 years ago
What are some harmful outcomes that stem from internet anonymous?
beks73 [17]
This link should help u:

www.bbc.com/capital/story/20150309-the-danger-of-online-anonymity
7 0
3 years ago
What is the text output by the program?
Ostrovityanka [42]

Answer:

30 or more

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following is NOT a reason to include comments in programs
wel

Answer:

C. Comments help document how code was written for other programmers to use.

Explanation:

I think it i C.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • To move one screen to the left press ____.
    9·1 answer
  • Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
    11·1 answer
  • Write a recursive function that takes a non-negative integer as an argument and displays the same number in reverse order (i.e.
    15·1 answer
  • Imagine you are asked to set up a network for connecting 50 computers in an office environment. Discuss the type of network you
    13·1 answer
  • A field with the ____ data type can store a unique sequential number that Access assigns to a record. Access will increment the
    7·1 answer
  • What are the step by step instructions on how to rename a document(without opening it) that is filed in my computer/my documents
    9·1 answer
  • Having just one error on a cover letter may eliminate an applicant from being considered for employment?
    13·1 answer
  • What are the advantages of using an external style sheet?
    9·1 answer
  • Which work habits should you follow to increase work efficiency and avoid health issues?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!