1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
10

Consumers who wish to make a purchase from other consumer on ebay need tl

Computers and Technology
1 answer:
il63 [147K]3 years ago
8 0

Answer:

Bid on item

Explanation:

Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.

When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.

You might be interested in
Which of the following job duties would a software developer perform?
juin [17]

<u>The most important job duty of a software developer is to develop a product/program that is easy to use and melts a customer’s need.</u>

<u></u>

Explanation:

Some other duties of  a Software developer are

  • Researching,designing and implementing new software program's and then managing them
  • Testing and evaluating the developed software program's
  • Identifying errors in the existing program's and modifying the same
  • Writing effective codes
  • employing various software tools
  • Training new users
  • Working closely with the other developers

8 0
3 years ago
4. When inserting clip art into a page of text, which of the following is true? (1 point)
ella [17]
I would vote for D since you can adjust picture positioning and wrapping. A is BS, B and C are not true.
8 0
2 years ago
Read 2 more answers
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
Which of the following cannot be copyrighted? a. books b. inventions c. videos d. music
natita [175]
Well books, videos and music can all be copyrighted (I believe) so the logical answer would be b. inventions. Hope this helps.
7 0
3 years ago
How can having more than one goal cause truble in the work place
siniylev [52]

Answer:

"Having more than one goal can cause problems at work as it makes it difficult to focus on just one thing and thus can lead to poor results. This is because by having multiple goals there is less concentration, less focus and therefore less ability to accomplish various goals at work with more efficiency and quality."

6 0
2 years ago
Other questions:
  • Explain the relationship between society and the technologies of using Earth's resources?
    14·1 answer
  • What policy definition can help remind employees in the User Domain about what constitutes suitable use and improper use of corp
    14·1 answer
  • What are some elements commonly included in forms in Word? Check all that apply.
    14·1 answer
  • What is ucspi-tcp pakage in qmail??
    5·1 answer
  • What is the radix transformation method?
    5·1 answer
  • What is 3x10? PLZZZZZ
    11·1 answer
  • Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
    14·1 answer
  • Examples of pop in computer​
    14·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!