1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
15

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check

out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction
Computers and Technology
1 answer:
MakcuM [25]3 years ago
7 0
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
You might be interested in
A(n) _____ is a network connection device that can build tables that identify addresses on each network.
Neko [114]

Answer:

Dynamic Router

Explanation:

5 0
3 years ago
List three things that scientists learned about earth beginning in the 1800s
Nataly [62]
They learned the earth was much older than they had previously thought.
Gradual processes changed the earth's surface.
Fossils could tell the age they came from.
8 0
4 years ago
Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
Minchanka [31]

Answer:

Shut down the computer.

Explanation:

l hope it help

4 0
3 years ago
Read 2 more answers
Who do we make games for?(single term)
Ket [755]

Answer:

Gamers

Explanation:

5 0
3 years ago
Read 2 more answers
High-level languages must be translated into machine language before they can be executed. _________________________
Rufina [12.5K]
High-level language programs must be translated into machine language before they can be executed. (Machine language instructions are encoded as binary numbers that are meant to be used by a machine, not read or written by people. The Java compiler translates Java programs into a language called Java bytecode.
4 0
3 years ago
Other questions:
  • The disk drive is a secondary storage device that stores data by _____ encoding it onto a spinning circular disk.
    14·1 answer
  • The amount you pay your insurer for your insurance plan is which of the following?
    14·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • Which of these techniques will contribute to green computing?
    10·1 answer
  • Given that n refers to a positive integer, use a while loop to compute the sum of the cubes of the first n counting numbers, and
    12·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • What is the most likely result of a correctly installed processor, but an incorrectly installed cooler?
    6·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • What is the collection of programs designed to operate control and manage the actual operation of the computer equipment​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!