1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Computers and Technology
1 answer:
kipiarov [429]3 years ago
7 0

Electronic data interchange (EDI), <u>e-cash</u>, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

  • Electronic data interchange (EDI).
  • e-cash.
  • Smart cards.
  • Digital certificates.

Read more: brainly.com/question/24112967

You might be interested in
How are a cell's content and format related?
hram777 [196]

Answer:

A

Explanation:

The content doesn´t interact with the format.

8 0
4 years ago
Read 2 more answers
Darcy was working on a presentation on playing chess. Because she chose the Checkerboard animation for her slide title, she had
otez555 [7]
The answer is true
Helene
7 0
3 years ago
Read 2 more answers
4.2 lesson practice last one plzs help
yan [13]

The numbers 5, 7, 9, and 11 are the output.

I hope this helps!

7 0
3 years ago
Read 2 more answers
What is a win-win situation?
Ilia_Sergeevich [38]
A. Each party benefits in some way
6 0
3 years ago
Which of the following is a malicious program that can replicate and spread from computer to computer?
netineya [11]
<span>Virus is the answer.
have any other questions that are in middle school, let me know.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the best way to protect computer equipment from damage caused by electrical spikes?
    9·2 answers
  • What tab must you click on to view any previously read messages from instructors in the message center?
    14·2 answers
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • 20 points
    6·2 answers
  • What three things in the third generation of computing helped get programming enthusiasts more involved with computers? Select 3
    12·2 answers
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • All the network nodes are connected to each other
    8·1 answer
  • What do u mean by generation of computer
    10·1 answer
  • Software is in -----language​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!