1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
15

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check

out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction
Computers and Technology
1 answer:
MakcuM [25]2 years ago
7 0
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
You might be interested in
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choice
maw [93]

Answer:

a. leap frogging

Question:

Because some countries have poor traditional telephone services, companies and consumers have resorted to Group of answer choices leap frogging. express package services. satellite telephones. fiber-optic telephones. voice over internet protocol (VOIP) services.

3 0
3 years ago
Match the item to the type.​
Roman55 [17]
The chart with the circle in the top right is a pie chart

the top left chart on enrollment is a histogram

the bottom chart is a bar chart
3 0
2 years ago
Why does my messenger say this person is unavailable on messenger.
max2010maxim [7]

Answer:

The person left

Explanation:

The person could of been banned or deleted their account

3 0
2 years ago
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
enot [183]

white or light colors

5 0
3 years ago
Read 2 more answers
Other questions:
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    7·1 answer
  • A ___________ is the smallest unit in a written language.
    7·2 answers
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    10·1 answer
  • Consider the following static method.
    9·1 answer
  • Define the term visual as used in visual programming
    9·1 answer
  • Downlad the file and write a program named Lab10b_Act2.py that does the following: Opens the CSV file for reading Reads the CSV
    15·1 answer
  • Budgeting for a Computer
    6·1 answer
  • 9- Write a program in MARIE to add three numbers.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!