To consider code as having been delivered from the same origin, it is important to match certain criteria. This is essential to maintain security and prevent unauthorized access to sensitive information. The criteria that need to be matched include the source domain, protocol, and port number. However, out of the given options, the one that does not need to be matched is the file extension.
File size, creation date, and code author are all important factors that help determine the authenticity of the code. File size and creation date can be used to verify if the code has been tampered with or modified. Code author information can help determine if the code is trustworthy or not. In some cases, file extension can also be useful in identifying the type of code and its functionality. However, it is not essential to match the file extension to consider code as having been delivered from the same origin.
In conclusion, while file size, creation date, code author, and file extension are all important factors in determining the authenticity of code, only the file extension does not need to be matched to consider code as having been delivered from the same origin. Matching the other criteria is essential to maintain security and prevent unauthorized access to sensitive information.
To know more about code visit:
https://brainly.com/question/17204194
#SPJ11
What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.
Answer:
Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.
Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.
Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.
a directory is also an object to which access should be controlled. why is it not appropriate to allow users to modify their own directories?
A second object to which access should be restricted is a directory. Why should users not be able to change their own directories. The best approach is to limit who can access a folder.
Directory Permissions Explained?
Protecting sensitive information is ensured by setting folder permissions. An object's ability to access or edit other objects and files in the directory is governed by a set of rules known as AD permissions. Additionally, you can look for Windows Security in the start menu. Choose the tile labeled Virus & threat protection.
Since the administrator does not have complete control over object access, it is possible that permissions could be configured erroneously, which could result in a data breach. By default, all users have access to create and modify objects in the workspace, such as notebooks, experiments, and models.
To learn more about own directories from given link
brainly.com/question/25480553
#SPJ4
people who use a/an ________________ design logic believe that the given context determines what type of communication is appropriate.
People who use a/an contextual design logic believe that the given context determines what type of communication is appropriate.
Contextual design logic emphasizes the importance of considering the specific situation, environment, and audience when determining the most effective and appropriate means of communication. It recognizes that different contexts require different communication strategies and channels to convey information effectively.
By adopting a contextual design logic, individuals or organizations take into account factors such as cultural norms, social dynamics, communication goals, and the characteristics of the intended recipients. This approach helps ensure that the communication is tailored to the specific context, taking into consideration factors such as language, tone, medium, and level of formality.
Contextual design logic encourages a more nuanced and adaptable approach to communication, recognizing that what may be suitable in one context may not be effective or appropriate in another. It promotes sensitivity and responsiveness to the context in order to achieve clear, meaningful, and impactful communication.
learn more about "communication ":- https://brainly.com/question/28153246
#SPJ11
Stephen has been instructed to update all three routers' firmware for his organization. where should he document his work?
As Stephen has been instructed to update all three routers' firmware for his organization, the change management system is where he should document his work.
What is a change management system?The system involves a process that is responsible for managing all changes to the production operations environment from inception to completion.
The system of change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in data culture and literacy.
Therefore, the change management system is where Stephen should document his work.
Read more about change management system
brainly.com/question/24268860
#SPJ1
The code to perform a binary search is below. Match the variable name with what it holds.
first = 0
last = len(data) - 1
done = False
numberPasses = 0 while first <= last and not done:
middle = (first + last) // 2
numberPasses =
numberPasses + 1
if data[middle] == 10:
done = True
else:
if data[middle] > 10:
last = middle - 1
else:
first = middle + 1
(This is a matching thing and the terms last, middle, and first are supposed to be matched in order to the options below I’ll give branliest!!)
-the index of the center item in the list being considered
-the index of the rightmost member of the list being considered
-the index of the leftmost member of the list being considered
Answer:
First - The index of the leftmost member of the list being considered
Middle - The index of the center item in the list being considered
Last - The index of the rightmost member of the list being considered
Explanation:
Got it right on EDG. Sorry if I'm a little late but have a good day!
Which of the follow efficiencies would be considered unreasonable?
Answer:
Exponential or factorial efficiencies algorithms
Explanation:
In a computer engineering system, the efficiencies that would be considered unreasonable is the "Exponential or factorial efficiencies algorithms"
This is unlike Algorithms with a polynomial efficiency that is considered to have Reasonable Time.
A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most of these callers are put "on hold" until a company operator is free to help them. The company has determined that the length of time a caller is on hold is normally distributed with a mean of 2.5 minutes and a standard deviation 0.5 minutes. If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x? Use Excel, and round your answer to two decimal places.
Answer:
3.59 minutes
Explanation:
We solve this question using z score formula
Using Excel
Z-SCORE= (DataPoint-AVERAGE(DataSet))/STDEV(DataSet)
IN EXCEL,
AVERAGE, an excel function that calculates the Average of data set
STDEV.S: calculates the standard deviation while treating the data as a ‘sample’ of a population.
STDEV.P: This function calculates the standard deviation while treating the data as the entire population.
Z score formula = x - μ/σ
x = ?? μ = 2.5 minutes σ = 0.5 minutes
We are asked : If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x?
Hence, Longer than = Greater than =
100 - 1.5%
= 100 - 0.015
= 0.985 ( 98.5%)
Using Excel we calculate = z score for 98.5 percentile
= 2.1701
Z score = x - μ/σ
2.1701 = x - 2.5/0.5
2.1701 × 0.5 = x - 2.5
1.08505 = x - 2.5
x = 1.08505 + 2.5
x = 3.58505
Approximately to 2 decimal places = 3.59 minutes
Therefore, 1.5% of the callers are put on hold for longer than 3.59 minutes.
If you have an on-premise system and you use AWS Cloud to mirror data or replicate data from your on-premise system, which architectural pattern are you using?
Select one:
a.
Fully Working Low-Capacity Standby
b.
Pilot Light
c.
Multi-Site Active-Active
d.
Backup and Restore
The architectural pattern that corresponds to using AWS Cloud to mirror or replicate data from an on-premise system is the Multi-Site Active-Active pattern. By using the Multi-Site Active-Active pattern, organizations can achieve increased scalability, resilience, and disaster recovery capabilities.
In the Multi-Site Active-Active pattern, both the on-premise system and the AWS Cloud infrastructure are active and operational simultaneously. The on-premise system serves as one site, while the AWS Cloud serves as another site. Data is replicated or mirrored between these two sites, ensuring that both systems are synchronized and up-to-date.
This pattern allows for high availability and fault tolerance. In case of a failure or disruption in one site, the other site can seamlessly take over and continue serving the workload. The data replication ensures that the systems stay synchronized, minimizing any potential data loss.
It allows them to leverage the flexibility and scalability of the AWS Cloud while maintaining the on-premise system for certain specific requirements or to distribute the workload across multiple locations.
Learn more about data here:
https://brainly.com/question/21927058
#SPJ11
A ________ examines each part of a message and determines whether to let that part pass.
Answer:
packet-filtering firewall
Explanation:
A packet-filtering firewall examines each part of a message and determines whether to let that part pass.
which of the following is not a digital video file format? a avi
b mpeg-4 c pdf d wmv
The answer is c) PDF.PDF (Portable Document Format) is not a digital video file format. It is a file format primarily used for documents, such as text documents, images, or presentations.
On the other hand, the other options mentioned are digital video file formats:a) AVI (Audio Video Interleave) is a multimedia container format commonly used for storing video and audio content. It was introduced by Microsoft and is supported by various media players and devices.b) MPEG-4 (Moving Picture Experts Group-4) is a digital video compression format used for encoding and compressing video content. MPEG-4 is widely used for online streaming, video sharing platforms, and multimedia applications.d) WMV (Windows Media Video) is a video compression format developed by Microsoft. It is often used for streaming and storing video content and is compatible with Windows-based systems and media players.Therefore, the correct answer is c) PDF, as it is not primarily designed or optimized for digital video file storage and playback.
To know more about Document click the link below:
brainly.com/question/31983788
#SPJ11
Can someone come and see if I have answered this question correctly? Please ...
if i have a mistake or somewhere i can go deeper can you correct me? Thank you
Answer:
presentation or visualization
what happens in a word document through office presentation service when someone is viewing a different portion of the document than the presenter?
When someone is viewing a different portion of a Word document than the presenter, the Office Presentation Service displays two separate instances of the same document.
The presenter sees their instance with their edits highlighted, and the viewers see their instance with the presenter's edits. This allows the presenter to make changes and viewers to stay on the same page as the presenter.
The presenter can also control what portion of the document the viewers can see. For example, the presenter can hide certain slides or parts of the document so that the viewers can't see them. This is especially useful in case the presenter wants to review an older version of the document without the viewers seeing it.
The presenter can also choose to have everyone view the same portion of the document at the same time so that everyone can see the changes that the presenter makes. This allows for more efficient collaboration, as all viewers will be up-to-date with the changes that the presenter makes.
Overall, the Office Presentation Service makes it easy for viewers to view a different portion of a document than the presenter while allowing the presenter to control what the viewers see and when. This allows for more efficient collaboration and makes it easier for everyone to stay on the same page.
You can learn more about Word documents at: brainly.com/question/30490919
#SPJ11
Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting from that number "What is the hailstone sequence?" you might ask. Well, there are two rules: • If n is even, then divide it by 2 • If n is odd, then multiply it by 3 and add 1 Continue this sequence until you hit the number 1.
n=int(input("Enter number: "))
while n != 1:
print(n)
if n%2==0:
n//= 2
else:
n = (n*3)+1
print(n)
I wrote my code in python 3.8. If you want to print the 1, keep the last line of code otherwise delete it.
Which statement is most accurate?Batteries with higher voltage will always produce a lower current rating than batteries with low voltages. Voltage is not a good indicator of electrical current that batteries can produce. A 1.5 volt battery has less ability to move electrons than a 6 volt battery. A 12 volt battery creates more electrical pressure than a 24 volt battery.
A 12 volt battery creates more electrical pressure than a 24 volt battery.
What is meant by volt?-A measurement of the electromotive force and electrical potential difference between two places in a conducting wire carrying a continuous current of one amp when the power applied between these two sites is equal to one watt.
-A volt is defined as the energy consumption of one joule for every coulomb of electrical charge. 1V = 1J/C.
One volt is the difference in potential between two locations in a wire carrying one ampere of current when the power expended between the places is one watt.
-Volts are units of electrical potential, potential difference, and electromotive force in the metre-kilogram-second system (SI).
To know more about volt visit:-
brainly.com/question/27861305
#SPJ1
Did anyone else remember that Unus Annus is gone? I started crying when I remembered.... Momento Mori my friends.... Momento Mori...
Answer:
???
Explanation:
Did I miss something?
Answer:
Yes I remember its gone.
Explanation: I was there when the final seconds struck zero. The screen went black, and the people screaming for their final goodbyes seemed to look like acceptance at first. I will never forget them, and hopefully they will remember about the time capsule. Momento Mori, Unus Annus.
what is a defult? pls help if you wouldn't mind
Answer:
a beginner or a novice
Explanation:
Examine this code. Which is the best prototype? string s = "dog"; cout << upper(s) << endl; // DOG cout << s << endl; // dog
The choice between the two prototypes depends on the desired behavior and whether the intention is to modify the original string or create a new string with the uppercase version.
Based on the given code, it appears that there is a function upper() being called with a string s as an argument. The expected output is to print the uppercase version of the string s followed by printing the original string s itself.
To determine the best prototype for the upper() function, we need to consider the desired behavior and the potential impact on the input string s.
If the intention is to modify the original string s and convert it to uppercase, then a prototype that takes the string by reference or as a mutable parameter would be appropriate. This way, the changes made inside the upper() function would affect the original string.
A possible prototype for the upper() function could be:
void upper(string& str);
This prototype indicates that the upper() function takes a reference to a string as input and modifies the string directly to convert it to uppercase.
Using this prototype, the code snippet provided would output the modified uppercase version of the string s ("DOG") followed by the same modified string s ("DOG"), since the changes made inside the upper() function affect the original string.
However, if the intention is to keep the original string s unchanged and create a new string with the uppercase version, then a prototype that returns a new string would be more appropriate.
A possible prototype for the upper() function, in that case, could be:
string upper(const string& str);
This prototype indicates that the upper() function takes a constant reference to a string as input and returns a new string that is the uppercase version of the input string.
Using this prototype, the code snippet provided would output the uppercase version of the string s ("DOG") followed by the original string s itself ("dog"), without modifying the original string.
The choice between the two prototypes depends on the desired behavior and whether the intention is to modify the original string or create a new string with the uppercase version.
To know more about prototypes, visit:
https://brainly.com/question/29784785
#SPJ11
using Notepad, create two (2) fies: data1.txt and data2.txt (save them to the same folder as your Java application)
populate each fie with 10 to 20 integers (positive & negative integers and zero, separating each value with a space, or one-per-line
(manually calculate the minimum, maximum, and average of the values in each file, so you can verify your application)
In order to create two files (data1.txt and data2.txt) with 10 to 20 integers in each, saved in the same folder as the Java application, follow these steps: Open Notepad (or any text editor of your choice).Click on "File" and select "Save As" to save the file with a .txt extension.
Name the file "data1.txt" and save it in the same folder as your Java application. Enter 10-20 integers, including negative integers, zero, and positive integers. Separate each integer with a space or place one per line. Here's an example of how the file's contents could look: 2 4 -6 0 8 -9 13 21 17 -3Manually calculate the minimum, maximum, and average of the values in each file. In the case of data1.txt, the minimum value is -9, the maximum value is 21, and the average value is 5.7.
Save and close data1.txt.Repeat steps 2-4 to create data2.txt. Here's an example of what the file's contents could look like: 4 6 -2 -3 1 -5 0 10 -1 15Manually calculate the minimum, maximum, and average of the values in each file. In the case of data2.txt, the minimum value is -5, the maximum value is 15, and the average value is 3.5. Save and close data2.txt.
To know more about extension visit:
https://brainly.com/question/32532859
#SPJ11
Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ____________________ time or a_____________________ or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.
Answer:
1) Imprisonment
2) Fine
Explanation:
By the 2013 Mississippi Code, on Cybercrimes and Identity Theft, it is against the law to make use of electronic mail or other forma of electronic communication to engage in cyber bullying, which involves the use of threatening language of inflicting arm or with an aim to extort money from another person
The punishment for cyber bullying, includes imprisonment time or a fine or both.
Therefore, for the question, we have; Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur imprisonment time or a fine or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.
Exercise 8.2.1: Identifying properties of relations.
For each relation, indicate whether the relation is:
reflexive, anti-reflexive, or neither
symmetric, anti-symmetric, or neither
transitive or not transitive
Justify your answer.
(f) The domain for relation R is the set of all real numbers. xRy if x - y is rational. A real number r is rational if there are two integers a and b, such that b ≠ 0 and r = a/b. You can use the fact that the sum of two rational numbers is also rational.
(g) The domain for the relation is Z×Z. (a, b) is related to (c, d) if a ≤ c and b ≤ d.
(h) The domain for the relation is Z×Z. (a, b) is related to (c, d) if a ≤ c or b ≤ d (inclusive or).
(i) The domain for relation T is the set of real numbers. xTy if x + y = 0.
(f) The relation R is neither reflexive nor anti-reflexive because xRx is false for all real numbers x. The relation R is not symmetric since if x - y is rational, then y - x is the negative of x - y, which is also rational, and hence not necessarily equal to x - y.
The relation R is not anti-symmetric either, since there exist pairs of distinct real numbers, such as (1, 2) and (2, 1), such that both (1, 2)R(2, 1) and (2, 1)R(1, 2). The relation R is transitive because if x - y and y - z are both rational, then their sum (x - y) + (y - z) = x - z is also rational.
(g) The relation is reflexive since (a, b) ≤ (a, b) for all pairs (a, b) in Z×Z. The relation is anti-symmetric because if (a, b) ≤ (c, d) and (c, d) ≤ (a, b), then a ≤ c and c ≤ a, which implies a = c, and likewise b = d. Therefore, (a, b) = (c, d). The relation is transitive because if (a, b) ≤ (c, d) and (c, d) ≤ (e, f), then a ≤ c ≤ e and b ≤ d ≤ f, which implies (a, b) ≤ (e, f).
(h) The relation is neither reflexive nor anti-reflexive since (a, b) is not related to itself in general, but it may be related to itself if a ≤ b. The relation is not symmetric because if (a, b) is related to (c, d), then either a ≤ c or b ≤ d, but it is not necessary that either c ≤ a or d ≤ b. The relation is transitive because if (a, b) is related to (c, d) and (c, d) is related to (e, f), then either a ≤ c or b ≤ d, and either c ≤ e or d ≤ f, which implies either a ≤ e or b ≤ f, and hence (a, b) is related to (e, f).
Learn more about reflexive here:
https://brainly.com/question/29119461
#SPJ11
Single-element cartridge fuses are commonly used in motor control circuits.A. TrueB. False
A. True. Single-element cartridge fuses are commonly used in motor control circuits to provide protection against overcurrent and short-circuit conditions.
Single-element cartridge fuses are indeed commonly used in motor control circuits. These fuses are designed to protect individual components, such as motors or controllers, from damage due to overcurrent or short circuit events.
However, there are other types of fuses that can be used in motor control circuits, such as dual-element fuses. These fuses have two separate elements that provide both overload and short circuit protection.
Therefore, while single-element cartridge fuses are commonly used in motor control circuits, they are not the only type of fuse that can be used.
Learn more about motor here:
https://brainly.com/question/31214955
#SPJ11
True.Single-element cartridge fuses are commonly used in motor control circuits as they provide protection against overcurrent and short circuits.
They are designed to interrupt the flow of current when the rated current is exceeded, thus protecting the equipment and wiring. The fuses are installed in the circuit and are rated based on their current carrying capacity and interrupting rating. These fuses are easy to install and replace, making them a popular choice for motor control circuits.
Learn more about element here;
https://brainly.com/question/31544245
#SPJ11
pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.
The given statement of copyrighted work is false.
What do you mean by copyright?
A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.
When you use someone's copyrighted work in something you are selling, you must get their permission first.
To learn more about copyright
https://brainly.com/question/357686
#SPJ13
WHERE CAN I FIND HOW MANY POINTS I EARNED!
BE SPECIFIC PLS
EXACT LOCATION
Answer:
This is the option if you are using brainly in the browser.
On the right top corner click on your account, then click view profile.
In your profile under your username, you have the number of points you earned.
If you are using the app brainly
Go on the app, click profile on the right low corner and under your username you should be able to see your points
I hope that helped.
Explanation:
This is the option if you are using brainly in the browser.
On the right top corner click on your account, then click view profile.
In your profile under your username, you have the number of points you earned.
If you are using the app brainly
Go on the app, click profile on the right low corner and under your username you should be able to see your points
I hope that helped.
What type of software has been developed to enable users to make use of the vast amount of data being collected and organized today?.
Answer:
The type of software that has been developed to enable users to make use of the vast amount of data being collected and organized today is Analytics software.
What is Software?
A set of instructions, data, or programs used to run computers and carry out specified activities is referred to as software. It is the inverse of hardware, which describes a computer's physical components. Software is a catch-all phrase for apps, scripts, and programs that execute on a device.
Analytics software is a sort of software that has been developed to allow users to make use of the large quantity of data that is being gathered and structured nowadays.
It is used to compute the performance of digital content and to convert business information into reports. Therefore
Explanation:
I don't understand how to do these. It's python by the way.
Answer:
Disclaimer: I dont put the Euler, magic word, and another variables, you need to do this
Explanation:
1°
print(eulersNumber[16])
print(eulersNumber[26])
print(eulersNumber[31])
2°
print(magicWords[:3]+magicWords[8:10])
3° I dont know how i can make this
4°
print(a[::-1])
print(b[::-1])
print(c[::-1])
print(x[::-1])
print(y[::-1])
Have a nice day
T/F. a comment in excel can capture an ongoing text conversation.
It is accurate to say that an excel comment can record a text dialogue in progress.
Can Excel threaded chats incorporate comments?The way comments function has changed in Excel for Microsoft 365. Now that comments are threaded, you can discuss the data with other readers. Notes function similarly to comments did in older iterations of Excel and are used for creating notes or remarks regarding the data.
What is a comment and how is it used?Comments are text notes that are included into programs to provide explanations of the source code. In a programming language, they are used to describe the program, remind programmers of the tough things they recently accomplished with the code, and assist the following generation.
To know more about comments visit:-
https://brainly.com/question/30318947
#SPJ1
In sound recording, the result of the quality is determined by the and the sample precision Select one: a. notification rate b. sound to noise ratio c sample speed d sample rate e. bit frequency
In sound recording, the quality is determined by the sample rate and the bit depth.
The quality of sound recording is influenced by various factors, including the sample rate and the bit depth (also known as sample precision).
The sample rate refers to the number of samples taken per second during the recording process. It is typically measured in kilohertz (kHz) and determines the frequency range that can be accurately captured. A higher sample rate allows for wider frequency response and can capture more detail in the audio signal. Common sample rates used in audio recording include 44.1 kHz (CD quality) and 48 kHz (common for video production).
The bit depth, on the other hand, represents the number of bits used to represent each sample. It determines the dynamic range and resolution of the recorded audio. A higher bit depth allows for a greater dynamic range and a more precise representation of the audio signal. Common bit depths used in audio recording include 16-bit (CD quality) and 24-bit (common for professional recordings).
Together, the sample rate and the bit depth play a crucial role in capturing and reproducing high-quality audio recordings, ensuring an accurate representation of the original sound source.
Learn more about sample rate here:
https://brainly.com/question/29106201
#SPJ11
Question 2 of 5
Which detail from the story is part of the rising action?
O A. Mr. White is sorry he ever wished on the monkey's paw.
O B. Mr. White wishes his son were back in the cemetery.
C. The author establishes that the story begins on a cold, wet night.
O D. Mr. White pulls the monkey's paw from the fire.
SUBMIT
Answer:
D. Mr. White pulls the monkey's paw from the fire.
Explanation:
Rising action refers to the events in the stories that bring suspense and interest. It includes the crucial decisions and important events that leads towards the climax of the narrative. Rising actions focuses on the flaws that the characters possesses and create a space of tension.
In the story, "The Monkey's Paw" the rising action is observed when Mr. White pulls the monkey's paw from the fire to make the third wise respectively.
Answer:
Mr. White pulls the monkey's paw from the fire.
Explanation:
Need help ASAP
Thankss + BRAINLIST only for correct answers
Answer:
The purpose to the user is to buy items online.
The purpose to the creator is to have a worldwide service chain to deliver packages.
Vising this website gives access to the items consumers need and allows them to get them shipped right to their door.
It was made so the creator can lots of money along with making a lot of jobs to slow the unemployment rate.
Explanation:
I pulled a lot of this from my head and reading about schollarships Amazon has for students. Amazon is a shopping website. Therefore the user can buy things and it gives the creator money along with making jobs for others.
What is the difference between apple store and play store