A small business owner is sceptical about online transactions. She is worried that information may be stolen in transmission or that the party on the other end may be a bogus one. Also, she is worried about the security of financial transactions online.  What can be done  to allay those fears?

What will be an ideal response?


She could use encryption and digital certificate technologies. The data can be encrypted before transmission. Only the intended recipient of the transmission will be able to decrypt and use it.   In addition, she could sign up to use digital certification service to ensure the authenticity of the other party. The standards for processing financial transactions quite strict enough to ensure safeguarding the interests of the card issuer, the carholder and the merchant. 

Computer Science & Information Technology

You might also like to view...

As you build a GUI, recall that it’s often easier to manipulate layouts and controls via Scene Builder’s ________ window than directly in the stage design area.

a. Inspector b. Document c. Controller d. Library

Computer Science & Information Technology

Starting with the 2-3 tree from question 4), insert the elements 19 and 29. Sketch the tree after each insertion.

What will be an ideal response?

Computer Science & Information Technology

The written interview report:

A) should be written as soon as possible after the interview. B) should be a transcript of the interview. C) should not be shown to the interviewee since it may contain interview opinions that may not be perceived as favorable. D) should not contain the user's name or position.

Computer Science & Information Technology

________ is the horizontal width of a column

Fill in the blank(s) with correct word

Computer Science & Information Technology