Answer:
D. Electronic Funds Transfer (EFT)
Explanation:
e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.
This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.
A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.
In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).
Your program analyzes complex data.
You are going to read text from a file as part of your program.
The program is saved in a folder, which has a subfolder called "numbers."
In the info folder is a text file called "sales.txt."
Which line of code will open sales.txt?
O results = open("sales.txt","r")
O results.open("sales.txt", "w")
O results = open("numbers/sales.txt","r").
O results = open("numbers/sales.txt", "w")
Database Management Systems are featured with:
Question 3 options:
The facility to easy editing, spelling check, auto pagination, lay out and printing reports
The ability to store large amount of data to facilitate easy update, sort and retrieval
The ability to calculate efficiently with the help of built-in functions and analyze
None of the above
Answer:
Answer: Database Management Systems are featured with: The ability to store a large amount of data to facilitate easy updates, short, and retrieval.
Explanation: I took the test
Write the syntax.
1. for loop
2. while loop
3. function definition
4. function call
5. do while loop
Answer:
Explanation:
The following syntax's are written in Python and perform a very basic arithmatic operation within the loop of call as an example
1. for x in range(3):
print(x)
2. count = 0
while True:
print(count)
count += 1
if count == 4:
return False
3. def next_pow2():
return 3**2
4. next_pow2()
5. i = 1
while True:
print(i)
i = i + 1
if(i > 3):
break
#Python doesn't have an explicit do-while loop but can be emulated exactly as a do-while loop using the format written in answer 5.
Determine the value for the following recursive method when x = 19.
Answer:
[tex]f(19) = 2[/tex]
Explanation:
Given
[tex]f(x) = f(x - 5)+ 2[/tex] --- [tex]x > 9[/tex]
[tex]f(x) = -2[/tex] --- [tex]x \le 9[/tex]
Required
Find f(19)
f(19) implies that: x = 19
Since 19 > 9, we make use of:
[tex]f(x) = f(x - 5)+ 2[/tex]
[tex]f(19) = f(19 - 5) + 2[/tex]
[tex]f(19) = f(14) + 2[/tex] ----- (1)
Calculate f(14)
f(14) implies that: x = 14
Since 14 > 9, we make use of:
[tex]f(x) = f(x - 5)+ 2[/tex]
[tex]f(14) = f(14 - 5) + 2[/tex]
[tex]f(14) = f(9) + 2[/tex] ------ (2)
Calculate f(9)
f(9) implies that: x = 14
Since [tex]9 \le 9[/tex], we make use of:
[tex]f(x) = -2[/tex]
[tex]f(9) = -2[/tex]
So:
[tex]f(14) = f(9) + 2[/tex]
[tex]f(14) = -2 + 2[/tex]
[tex]f(14) = 0[/tex]
[tex]f(19) = f(14) + 2[/tex]
[tex]f(19) = 0 + 2[/tex]
[tex]f(19) = 2[/tex]
This line of code is in your program.
outFile = open("another.txt", "a")
How will outFile interact with the file it opens?
Answer:
it opens the file for appending
Answer:
write to the file, adding to the current contents of the file
Explanation:
The "a" stand for append. To append means to add onto the file.
I hope this helped!
Good luck <3
when should you stop where you are, drop to the
cover your face with your hands, and roll over and over?
A
if you burn a stump
B
if your clothes catch fire
if you draw a cool bath
if your top layer of skin is damaged
Answer:
A . if you burn a stump because if u roll over the fire will have a 90% chance of going out
You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario?
a. The confidentiality of the data
b. The integrity of the data
c. The accessibility of the data
d. None of the above
Answer:
a
Explanation:
nog
*
24. QUESTION 21:
Peacekeeper text is non-printing text that indicates where you can type.
(2.5 Points)
True
False
Answer: False
Explanation:
The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.
The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.
Use the drop-down menus to match each description to the correct type of form.
A form appears after opening a database, asking if you would like to view the fruits table, vegetables
table, or nutrition report:
Student test scores entered into a database:
A window appears before closing out of a database, asking you to save your work before exiting:
A basic form to input names, addresses, phone numbers, and e-mail addresses:
A suppliers form that contains a products form and a price form that pops up when you click on the Prices
button:
A form used as the basis of many websites because of its top-level organization system:
A form that has replaced the outdated switchboards:
Answer: switchboard, data entry, switchboard, flat, synchronized, navigation, navigation
Explanation: edgenuit work
Answer:A form appears after opening a database, asking if you would like to view the fruits table, vegetables table, or nutrition report:
✔ switchboard
Student test scores entered into a database:
✔ data-entry
A window appears before closing out of a database, asking you to save your work before exiting:
✔ switchboard
A basic form to input names, addresses, phone numbers, and e-mail addresses:
✔ flat
A suppliers form that contains a products form and a price form that pops up when you click on the Prices button:
✔ synchronized
A form used as the basis of many websites because of its top-level organization system:
✔ navigation
A form that has replaced the outdated switchboards:
✔ navigation
edge 2023
The last programming statement in a Java program is the class statement.
true
false
Answer:
False
Explanation:
Hope dis helps
One advantage of the Second generation of programming language is that it is machine dependent. True or False
Answer:
I THINK FALSE
Explanation:
In Excel, how many columns can be filtered at a time?
Answer:
When you apply the Filter function, after filtering one column, the next columns will be only filtered based on the result of the previous filtered column. It means that only AND criteria can be applied to more than one column.
Explanation:
Hope it helps you!
How do you increase the number of tries by one?
tries.add(1)
tries = tries + 1
tries = 1
Answer:
tries = tries + 1
Explanation:
This is a universal way to increment your variable. In some languages, the following notation also works:
tries++;
tries += 1;
Again, it depends upon the language you are using. Each language has it's own syntax.
Read the following examples, and decide whether each example describes a relational database or a flat
file. Use the drop-down menus to make your selection.
An author keeps track of income and expenses in a table:
A college admissions department stores detailed information about each applicant, including his or her
full name, address, high school, GPA, standardized test scores, intended major, and entrance exam
scores:
A social media website has many users who are allowed to upload photos, videos, and information about
themselves:
A library stores information about patron names, account numbers, books out on loan, the date books are
due, the date books are returned, the number of days a book is overdue, and overdue book fines; this
information allows the system to e-mail or call patrons to remind them to return books on time:
Answer: flat file, relational database, relational database, relational database
Explanation:
Edge
Answer:
1. flat file
2. relational detabase
3. relational detabase
4. relational detabase
Explanation:
on edg
You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should you implement when developing for mobile devices?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Increase margins and padding to make the text on the mobile device screen easier to read.
B
Avoid using heading tags to build the structure of the page and to style text.
C
Do not label form fields to avoid unnecessary verbiage.
D
Always use the alt attribute in your tags.
1. What are the advantages and disadvantages of technology in communication?
Answer:
ADVANTAGES:
First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.
2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks
DISADVANTAGES:
1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...
2-Distraction from Real Life. ...
3-Potential for Misunderstanding. ...
4-Decline of Grammar and Spelling...
5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest disadvantage
Explanation:
The advantages and the disadvantages of the communication with the used of the technology are: Quickly communicate and the lack of privacy.
What is communication?The term communication refers to the exchange of thoughts, ideas, and messages that are shared between two or more people. Without language, a person can survive, but without communication, no one can survive. Communication is divided into two categories, such as interpersonal and intrapersonal.
Advantages of the communication with the used of the technology are:
Quickly communicate.Easy to used.Managed the data and share the data easily.Disadvantages of the communication with the used of the technology are:
Privacy issues.Hacking Data.They recover the data all the time not to the easy.Hence, the significance of the communication are the aforementioned.
Learn more about on communication, here:
https://brainly.com/question/22558440
#SPJ2
what is a client server network and its features?
Answer:
A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.
Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
A digital certificate
B
A certificate authority
C
An Electronic Funds Transfer (EFT)
D
A payment gateway
Answer:
B is more probable option than C
Explanation:
I think its both B and C
A certificate authority does Secure Sockets Layer (SSL) used to authenticate a user or system before encrypting a session. Hence, option B is correct.
What is Secure Sockets Layer (SSL)?Secure Sockets Layer (SSL) is a security protocol used to establish an encrypted link between a web server and a web browser. It was replaced by Transport Layer Security (TLS) as the standard protocol, but the term "SSL" is still commonly used to refer to both SSL and TLS.
When a user enters a website using SSL/TLS, the website's server sends a public key to the user's browser. The browser then uses this public key to encrypt data that is sent back to the server.
This helps to prevent third parties from intercepting and reading the data being transmitted.
Thus, option B is correct.
To learn more about the Secure Sockets Layer (SSL), follow the link:
https://brainly.com/question/25401676
#SPJ2
plz help asap
Question # 2
Multiple Select
Employees are one of the main contributors to cybersecurity breaches because of _____? Select 3 options.
software bugs
negligence
lack of knowledge
inattention
malware
Answer:
I'd say negligence, lack of knowledge and inattention
Nicolai wants to add demand-based content to his Website so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Visitor tracking
B
Push technology
C
Pull technology
D
Search Engine Optimization (SEO)
Answer:
The audience development technique that best describe the process Nicolal wants to implement is;
C Pull technology
Explanation:
Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.
Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader
The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.
Given a Student class, create a class with following characteristics: The class name should be ClassRoom. Private variable students array to maintain the list of Student objects. Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list. Method getAllStudents should return all the students in ClassRoom.
Input Jack Jones Marry where, First & Second line represent a student's name and roll number. And so on Output 1 Jack 2 -Jones 3-Marry Assume that, Maximum "students" count can be 10.
Below is the code for the driver class - DriverMain.java
import java.util.*;
//Your program will be evaluated by this DriverMain class and several test case
public class DriverMain {
public static void main(String[] args) {
String name;
int rollNo;
int n = 0;
Student[] students = new Student[10];
ClassRoom classRoom = new ClassRoom();
Scanner input = new Scanner(System.in);
while(true){
name = input.nextLine();
if(name.equals(""))
break;
rollNo = Integer.parseInt(input.nextLine());
classRoom.addStudent(name, rollNo);
n++;
}
students = classRoom.getAllStudents();
for (int i = 0; i < n; i++) {
if(students[i]!=null)
System.out.print(students[i].getRollNo() + " - " + students[i].getName());
if (i < n - 1)
System.out.println();
}
}
}
//Below is the code for the Solution.java
// NOTE - THIS IS WHERE YOU WRITE THE CODE
import java.util.*;
class Student {
private String name;
private int rollNo;
public String getName() {}
public void setName(String name) {}
public int getRollNo() {}
public void setRollNo(int rollNo) {}
};
class ClassRoom {
private int i;
private Student[] students;
public void addStudent(String name, int rollNo) {
// WRITE YOUR CODE HERE
}
public Student[] getAllStudents() {
// WRITE YOUR CODE HERE
}
};
Answer:
Answered below
Explanation:
//Implementation of the addStudent method
public void addStudent(String name, int rollNo){
Student newStudent = new Student();
newStudent.name = name;
newStudent.rollNo = rollNo;
student.add(newStudent);
}
//Implementation of the getAllStudents method
public Student[] getAllStudents(){
return students;
}
Program C++ I need help!
Answer:#include <iostream>
using namespace std;
int main()
{
int factorial = 1;
for (int i = 5; i > 0; i--) {
factorial = factorial * i;
}
cout<<factorial;
return 0;
}
Explanation:
If you were at the front of a long line of people, stepped onto a chair and took a
picture of the line going back in the distance, what is the best F-Stop to use if you
want only the people in the middle to be in focus?
.
Which testing requires coding the test cases into a scripting language?
( blank) testing requires coding the test cases into a scripting language.
The Automation is smart testing requires coding the test cases into a scripting language.
What is test scripting language?A TEST SCRIPT is known to be a form of compositions of instructions that is known to be carry out on a system under test to see if the system can performs as it was expected.
Hence, the use of for Automation testing is smart testing requires coding the test cases into a scripting language.
Learn more about scripting language from
https://brainly.com/question/26103815
5.In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why?
Which type of data is shown below?
apple, 0.85
banana, 0.90
peach, 1.50
Answer:
dictionary data
Explanation:
data = {"apple" : 0.85, "banana" : 0.90, "peach": 1.50}
2. Android 1.1 was internally referred to as _________.
3. A large C program is divided into basic building blocks called as _________.
4. __________ are the in-built function in C programming system.
5. ______________ are special variables which can hold more than one value using the same
variable, using an index
Answer:
2. petit four
3. function
4. library functions
5. array
Write program to read 10 random numbers, then find how many of them accept division by 4,
5, and 6.
The program should print the output like this:
There are numbers accept division by 4
There are ------ numbers accept division by 5
There are ------ numbers accept division by 6
Help me guys with this question
Answer:
In Python:
import random
di4 = 0; di5 = 0; di6 = 0
for i in range(10):
num = random.randint(1,100)
if num%4 == 0:
di4+=1
if num%5 == 0:
di5+=1
if num%6 == 0:
di6+=1
print("There are "+str(di4)+" numbers accept division by 4")
print("There are "+str(di5)+" numbers accept division by 5")
print("There are "+str(di6)+" numbers accept division by 6")
Explanation:
This imports the random module
import random
This initializes the count of division by 4, 5 or 6 to 0
di4 = 0; di5 = 0; di6 = 0
This iteration is repeated 10 times
for i in range(10):
This generates a random number
num = random.randint(1,100)
Check if number is divisible by 4. If yes, increase div4 by 1
if num%4 == 0:
di4+=1
Check if number is divisible by 5. If yes, increase div5 by 1
if num%5 == 0:
di5+=1
Check if number is divisible by 6. If yes, increase div6 by 1
if num%6 == 0:
di6+=1
Print reports
print("There are "+str(di4)+" numbers accept division by 4")
print("There are "+str(di5)+" numbers accept division by 5")
print("There are "+str(di6)+" numbers accept division by 6")
Which of the following is a method of relationship management for an e-commerce Website?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Providing an automatic order tracking facility to customers
B
Requiring users to submit orders by telephone
C
Using validated HTML5 code
D
Performing Website maintenance
Answer:
if u find out can u lmk pls? j have a very similar question and I've been stuck for a min
Is Conflict Healthy ?
yes
Explanation:
because it has more things