1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
15

E-commerce transactions that are executed using wireless mobile devices are known as

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
4 0

Answer:

Answer is Mobile commerce

You might be interested in
A group consists of 10 kids and 2 adults. On a hike, they must form a line with an adult at the front and an adult at the back.
blsea [12.9K]

Answer:

b. 2.9!

Explanation:

There are is a mistake in the question.

Suppose the group consist of 10 kids and 2 adults, the number of ways in which they can form the line is:

= 2! 10!

= 2× 1× 10!

= 2.10!

But since that is not in the given option.

Let assume that the group consists of 9 kids and 2 adults, the number of ways in which they can form the line is:

No of ways the kids can be permutated =  9 ways

No of ways the adult can be permutated  = two ways.

Thus; the number of ways in which they can form the line = 2! 9!

= 2 × 1× 9!

= 2.9!

6 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
erastova [34]

Answer:

The correct answer to the following question will be "DHCP server".

Explanation:

A network manager that dynamically supplies and delegates equipment of clients with their IP addresses, standard portals and some other networking specifications, known as DHCP server.

  • It depends on the standard operating procedure classified as Dynamic Host Configuration Protocol to answer to client-specific broadcasting commands.
  • It's used to optimize the authentication mechanism of computers on IP channels, enabling them using applications and services including NTP, DNS, and any UDP or TCP-based networking protocol.

Therefore, the DHCP server is the right answer.

7 0
3 years ago
What is the most useful advantage of using the Slide Sorter view to rearrange slides instead of using the slide thumbnails in No
Eddi Din [679]
<span>b. In Slide Sorter view, the user can zoom in to read text on slides more easily or zoom out to see more of the presentation’s slides at once.
Moreover, in Normal View, the number of slides that you can see together at once is quite less, so it is more advantageous to use the Slide Sorter View to sort your slides
</span>
5 0
3 years ago
Which framework can be used to develop cross-platform applications?
k0ka [10]

Answer:

Qt framework

Explanation:

3 0
3 years ago
Other questions:
  • Can i earn money at weegy.com ?
    10·1 answer
  • this weekend you areplanning to complete part of your assignment at the library to do this you need to store data on a removable
    10·1 answer
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • Complete the paragraph describing characteristics of an audio mixer
    8·2 answers
  • Each time the user selects an item from a list box in a web page, a postback occurs, the web page will redisplay, and the page_l
    12·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • An ____ is an object that produces each element of a container, such as a linked list, one element at a time.
    13·2 answers
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!