1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
15

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check

out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction
Computers and Technology
1 answer:
MakcuM [25]2 years ago
7 0
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
You might be interested in
Five types of conflict in the school​
MrRissso [65]

Answer:

Conflicts can be classified into five different types: structural, value, relationship, interest, and data [

Explanation:

5 0
3 years ago
Read 2 more answers
Convert each of the fo" wing base ten representations to its equivalent binary form a. 6 b. 13 C. d. 18 e. 27
asambeis [7]

Answer:

6=110

13=1101

18=10010

27=11011

Explanation:

A decimal number is converted to binary number by constantly dividing the decimal number by 2 till the number becomes zero and then write the remainders in reverse order of obtaining them.Then we will get our binary number.

I will provide you 1 example:-

18/2 = 9   the  remainder =0

9/2 = 4    the remainder =1

4/2 = 2    the remainder =0

2/2 = 1     the remainder =0

1/2 = 0     the remainder =1

Writing the remainder in reverse order 10010 hence it is the binary equivalent of 18.

6 0
3 years ago
What is the best way to improve an online search
Slav-nsk [51]
Best way is to put your exact question! And do "advanced search"

Hope I helped and if you need more info or another question, then feel free to ask me!
Have a nice day!
6 0
3 years ago
Read 2 more answers
The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
DIA [1.3K]

The concepts of Power, anonymity and political utility for covert acts are pivotal to understanding state-on-state interactions within cyberspace.

<h3>What is Anonymity?</h3>
  • Anonymity describes cases where the interim person's identity is anonymous.
  • Some writers have argued that anonymity, though technically accurate, does not capture what is more centrally at stake in contexts of anonymity.
  • The essential concept here is that an individual is non-identifiable, unavailable, or untrackable.
  • Anonymity is seen as a technique, or a way of realizing, sure other values, such as solitude, or liberty.
  • Over the past few years, anonymity tools used on the dark web by offenders and harmful users have drastically changed the ability of law enforcement to use conventional surveillance Techni.

To learn more about Anonymity, refer to:

brainly.com/question/28115737

#SPJ4

3 0
1 year ago
I need help with the stalk holders project
anygoal [31]

Answer:

A project is successful when it achieves its objectives and meets or exceeds the expectations of the stake­holders. But who are the stakeholders? Stakeholders are individuals who either care about or have a vested interest in your project. They are the people who are actively involved with the work of the project or have something to either gain or lose as a result of the project. When you manage a project to add lanes to a highway, motorists are stakeholders who are positively affected. However, you negatively affect residents who live near the highway during your project (with construction noise) and after your project with far-reaching implications (increased traffic noise and pollution).

Explanation:

6 0
3 years ago
Other questions:
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
    14·1 answer
  • Which searching method requires that the list be sorted?
    5·1 answer
  • In CadStd, what does the Zoom All button do? A. Makes a drawing bigger so you can see small details B. Returns a drawing to a si
    5·1 answer
  • Can you call a mobile a computer. It Yes<br>why? If No why​
    7·2 answers
  • How would you reduce or minimize the size of a "file"?
    5·1 answer
  • Give a detailed example of how an app (that you use regularly)uses parameters. You must state the app's name and function, the p
    7·1 answer
  • Where can you find the sizing handles for a graphic, shape, or text box? Check all that apply.
    10·2 answers
  • Whats the difference between Input and Output? Give and example of an example on a M:B​
    15·1 answer
  • Is anybody willing to gift me V bucks? Gamer tag: SpiffyPlop
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!