1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
2 years ago
14

¿Qué tipo de información deben proteger los sitios de comercio electrónico?​

Computers and Technology
2 answers:
iris [78.8K]2 years ago
8 0
Deben proteger la información personal, como el lugar donde vive y su dinero.

(They should protect personal information like where you live and your money)


This sentence would typically be written by a student in Spanish 2-3.

Buena Suerte!
Ksivusya [100]2 years ago
4 0
Come Estás How are you
You might be interested in
___________ is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or
GaryK [48]

Answer: Package software

Explanation:

Packaged software is the software that contains the functions and programs that are similar in the nature and features.

It is designed in such a way so that it can attract the customers and user by providing the benefit of the selling of the collection of programs rather than buying individual software programs which costs higher.

Thus, it produced at a large scale as well as bought by numerous users.

4 0
3 years ago
In the Application, "The Effect of FDI on Rentals and Wages in Singapore," the annual growth rate in real rental rates for the 1
stellarik [79]

Answer:

Explanation:

Production function: In simple words, production function refers to the functional relationship between the quantity of a good produced (output) and factors of production (inputs).

Production function: In simple words, production function refers to the functional relationship between the quantity of a good produced (output) and factors of production (inputs).

FDI: A foreign direct investment is an investment in the form of a controlling ownership in a business in one country by an entity based in another country.

  • Singapore has encouraged foreign firms to establish subsidiaries within its borders, especially in the electronics industry.
  • Singapore has the fourth-largest amount of FDI in the world.
  • What has happened to the rental rate and the wage?
  • Find in the attachment a table which shows much of this.
  •    The annual growth rate in rental rates for the 1970-1990 period using the production function and marginal product was -5%.
6 0
3 years ago
Which of the following is NOT an example of editing?
Genrish500 [490]

Answer:

ang answer po at proofreading written

content

Explanation:

if I wrong please correction me!

8 0
2 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
Maria's manager asked her to print a certain document for their meeting. It took her so long to find the file that she was late
Hoochie [10]

hey let me and sans help. . . . .hmmm. . .

sans said create a word-processing document that lists where she has saved files.

9 0
3 years ago
Read 2 more answers
Other questions:
  • What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red
    14·1 answer
  • The action in which a router divides and forwards incoming or outbound message traffic to multiple links is known as
    15·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
    5·1 answer
  • What do you find when you first open a word processor and how do you adjust the document Indentitions
    6·1 answer
  • Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper
    12·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • What is one of the limitations of marketing in social media?.
    13·1 answer
  • Write an algorithm to print the odd number from 100 to 1​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!