1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Computers and Technology
1 answer:
kipiarov [429]3 years ago
7 0

Electronic data interchange (EDI), <u>e-cash</u>, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

  • Electronic data interchange (EDI).
  • e-cash.
  • Smart cards.
  • Digital certificates.

Read more: brainly.com/question/24112967

You might be interested in
Which of the following is not a use of a hash function
soldi70 [24.7K]

Answer:

the answer would be there

Explanation:

7 0
3 years ago
Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010
icang [17]

Answer:

The receiver will not detect the error.

Explanation:

The byte sent by transmitter: 10101010

The byte received by receiver due to channel noise: 10011010

If you see the bold part of the both sent and received bytes you can see that the number of bits changed is 2.

The two communicating devices are using a single-bit even parity check. Here there are two changed bits so this error will not be detected as this single bit even parity check scheme has a limit and it detects the error when the value of changed bit is odd but here it is even.

This parity scheme basically works well with the odd number of bit errors.

7 0
4 years ago
What are the different types database of end users? Discuss the main activi-ties of each
disa [49]

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

8 0
3 years ago
Read 2 more answers
This component is responsible for the logical order of processing?
Svetradugi [14.3K]

Answer:

A) ALU

Explanation:

The arithmetic logic unit (ALU) performs the arithmetic and logical functions that are the work of the computer.

So, the correct option is - A) ALU

6 0
3 years ago
Identify the menu under which you'll find the Header and Footer option.
Genrish500 [490]

The answer is B. View.

4 0
3 years ago
Other questions:
  • Most languages allow a specialized selection structure called the ____ structure when there are several distinct possible values
    8·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • The editing of digital photos us about the same level of difficulty as editing an analog photo
    12·1 answer
  • A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the
    10·2 answers
  • Technology has had
    10·1 answer
  • Submit your business presentation that clearly compares and contrasts three different cell phone service plans. I have TO HAVE I
    14·1 answer
  • What are the top 10 most dangerous computer viruses ?
    13·1 answer
  • ....................................................................................................
    12·1 answer
  • What kind of script is used to run code on the client
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!