1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
8

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Computers and Technology
1 answer:
kipiarov [429]3 years ago
7 0

Electronic data interchange (EDI), <u>e-cash</u>, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

  • Electronic data interchange (EDI).
  • e-cash.
  • Smart cards.
  • Digital certificates.

Read more: brainly.com/question/24112967

You might be interested in
What is the encoding technique called that is used to store negative numbers in the computer's memory
Anna007 [38]

Answer:

The following “ encoding techniques “ can be used to “ store negative numbers in a computers memory: “ “ Signed magnitude representation (SMR).

Explanation:

hope it helps.!!

6 0
2 years ago
What is the purpose of reading in typography
IgorLugansk [536]

Answer:

The main purpose of typography is to make life easier for your readership by making it easier to read what you've written: It makes it possible to to quickly scan your text. It entices your readers to engage with your text. When done well, it enhances the message it presents

4 0
3 years ago
Write a Java method onlyDigits that takes a string as a parameter. The method should remove from the string all characters, whic
Stels [109]

Answer:

public static String onlyDigits(String in){

    String digitsOnly = in.replaceAll("[^0-9]", "");

    return digitsOnly;

}

A Complete program is wrtten in the explanation section

Explanation:

public class TestClass {

   public static void main(String[] args) {

     String a = "-jaskdh2367sd.27askjdfh23";

       System.out.println(onlyDigits(a));

}

public static String onlyDigits(String in){

    String digitsOnly = in.replaceAll("[^0-9]", "");

    return digitsOnly;

}

}

The output: 23672723

The main logic here is using the Java replaceAll method which returns a string after replacing all the sequence of characters that match its argument, regex with an empty string

3 0
3 years ago
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
What does an Office employee use a computer for??
Neko [114]

Answer:

Work?

Explanation:

6 0
3 years ago
Other questions:
  • A list of the slides in a presentation is found here.
    7·2 answers
  • The atomic number of oxygen is 8. the atomic mass of oxygen is 16. him many neutrons does oxygen have
    12·1 answer
  • A resistor is marked with the following color bands: brown, black, red, and silver. What is the resistance of this resistor? A.
    14·2 answers
  • Write a main method that prompts the user for an integer between 1 &amp; 20 (inclusive). If the user enters an invalid number, p
    8·1 answer
  • What is the full form of RAM. ​
    5·2 answers
  • Laura has many online accounts discuss the privacy concerns associated with individuals use of the Internet
    15·1 answer
  • which driver must be running and configured to enable a PC to communicate with a CompactLogix PLC on an Ethernet network
    10·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • Can’t be opened because apple cannot check it for malicious software.
    15·1 answer
  • What are the most common processes and procedures handled by data warehousing specialists? select all that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!