1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Computers and Technology
1 answer:
kipiarov [429]3 years ago
7 0

Electronic data interchange (EDI), <u>e-cash</u>, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

  • Electronic data interchange (EDI).
  • e-cash.
  • Smart cards.
  • Digital certificates.

Read more: brainly.com/question/24112967

You might be interested in
Quiz #1: In Fnaf 4 After chris gets bit by Fredbear what animatronic does he start to possess and how does he die?
GalinKa [24]

Answer:

He starts to posess freddy and he dies in his sleep Which is in Fnaf 4. Freadbear crushed his skull.

Explanation:

4 0
3 years ago
Read 2 more answers
How can you specify a page has the highest priority?
coldgirl [10]

Answer:

1.0

Explanation:

Priority Tag is to be mentioned in Sitemaps

Various priority values range from 0.1 to 1.0. The highest priority page has the priority value = 1.0, and the lowest priority page has a value of 0.0, and the priority value varies with the priority of the page. And these values are assigned to the priority tag in the sitemap. The sitemap, in fact, is the XML file through which we can set the priority of a webpage.  

8 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
hodyreva [135]

Answer:

(B) A single public IP address that it can use for NAT

Explanation:

Because the IPV4 IP protocol is still used today, the number of available IP addresses is limited (only 4,294,967,296 addresses in the world), for this reason, the most correct practice is the assignment of a single public IP to those companies that acquire services from an ISP, with some few exceptional cases of companies that own several.

So that the company's addressing can be executed successfully, the use of NATs is enabled, this allows the translation of network addresses, allowing the company to have as many private networks as necessary and that these can be communicated Correctly with the global network, the Internet, through the public IP of the company.

7 0
3 years ago
Which statement is true about customizing presentation programs? A. You can add multiple animations to an object in a slide with
levacccp [35]

From all the given options, the correct statement about customizing presentation is (B) you can customize a pre-designed slide layout with the Slide Master.

The option (A) is false, because if you want to put animations on your slide objects, you need to go to the Animation tab, while option (C) is false because to view the animation that you assign to a slide object, you need to open the animation pane bar or go to slide show. Option (D) is false because you <em>can </em>make changes to the colors, fonts, and effects for pre-designed slide themes.

6 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
    9·1 answer
  • To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
    11·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    12·1 answer
  • _____ is a school-to-work program that provides the student with paid employment, school credit, and grades while participating.
    14·2 answers
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • What information medium is used to access information from the Internet in the form of HTML pages?
    12·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • PLEASE HELP!!!!
    7·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
  • Given a list of syntax errors from a compiler, a programmer should focus attention on which error(s), before recompiling?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!