What do you mean by E_shopping? Give three advantages of it. -Technology

1 Answer

Answer :

E-shopping or Online Shopping is the process of buying goods and services from merchants who sell their products on the Internet.Advantages of E-Shopping1. Finding a product online is much easier than looking for it in the local store.2. Nowadays online shopping is very reliable.3. Most of the stores provide money back guarantee.4. You have infinite options to choose a product.

Related questions

Description : Which one of the following is an e_Shopping website: -Technology

Last Answer : (iv) All of above

Description : Which one of the following is an e_Shopping website: -Technology

Last Answer : (iv) All of above

Description : Sakshi is preparing a lecture on output device like monitor. Discuss. (i) Give some advantages of the output device ‘monitor’. -Technology

Last Answer : (i) (a) Relatively cheap and reliable.(b) Can display text and graphics in a wide range of colors.(ii) (a) No permanent copy to keep the results as it will disappear when the computer is switched OFF.(b) Unsuitable for users with visual problems.

Description : Which one of the magnetic storage disk is also known as diskette? Explain it with its advantages and disadvantages. -Technology

Last Answer : Floppy disk drive is also known as diskette or FDD. It is a computer disk drive that enables a user to save data on removable diskettes.This portable storage device is a rewritable media that can ... damaged and not much reliable.2. Quite slow to access and retrieve data.3. Easily affected by heat

Description : Mention any two advantages of E_mail over conventional mail. -Technology

Last Answer : Advantages1. E-mail is extremelycost effective.2. E-mail takes lesser time for transmitting data than conventional mail.Disadvantage1. Need of Internet connection to send/receive mail.

Description : What is an E_mail? Write two advantages of an E_mail. -Technology

Last Answer : E-mail (Electronic mail) is a popular Internet service, which is used for sending or receiving messages electronically over a computer network.The advantages are as follows:1. E-mail is a cost-effective medium of communication.2. Ease of use.

Description : List some advantages and disadvantages of an E_mail. -Technology

Last Answer : Advantages of E-mail are as follows:1. Low cost We can send the E-mail to other person at a very low cost. It requires only Internet connection cost to send the E-mail.2. Speed E-mail ... extra clues of voice, posture and expression, it is easy to understand what someone really means in a message.

Description : Write any two advantages of using database. -Technology

Last Answer : 1. Can ensure data security.2. Reduces the data redundancy.

Description : Define database management system. Write two advantages of using database management system for school. -Technology

Last Answer : Database Management System (DBMS) is a collection of programs that enable users to create, maintain database and control all the access to the database. The primary goal of the DBMS is to ... centralized location.2. It provides security to the personal information of the school, stored in it.

Description : Write down the advantages of networking for an office. -Technology

Last Answer : Various advantages of networking for an office are as follows:1. Using network we can store our files in many places or computers for data recovery purpose from a disk crash.2.It provides sharing of ... , i.e. they can be centralised and can be accessed by anyone from the central system itself

Description : List two advantages of online backup. -Technology

Last Answer : Two advantages of online backup are as follows:1. By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.2. No hardware is needed to maintain or repair the backup.

Description : Write the advantages of using Unicode to represent text. -Technology

Last Answer : Unicode encoding standard provides the basis for processing, storage and interchange of text data in any language in all modern software and information technology protocols.

Description : Discuss the advantages and disadvantages of advertising in different forms of media. -Technology

Last Answer : Student should be able to discuss following five points During the process of Adaptation:i. A new narrative is formed.ii. The new narrative in formed another medium.iii. Script-writer and Director ... context of the original may change.v. The new narrative is an interpretation of the original.

Description : List the advantages of using CSS. -Technology

Last Answer : It controls layout of many documents from one single style sheet.It has more precise control of layout.It applies different layouts to different media-types.It has numerous advanced and sophisticated techniques to be applied on web page

Description : Mention any two main advantages of star topology over bus topology. -Technology

Last Answer : (i)It has centralized control.(ii) Fault diagnosis is easy.

Description : Write the advantages of using Unicode to represent text. -Technology

Last Answer : Advantages of using Unicode to represent text are as follows :1. Allows for multilingual text using any or all the languages that you desire.2. Text in any language can be exchanged worldwide

Description : Identify the topology shown below. Write 2 advantages of this topology. -Technology

Last Answer : Star Topology Two advantages of star topology are as follows :1. Easy to detect faults and remove It.2. Failure to single system will not bring down the entire network.

Description : What is the significance of icons? Give the example of any three types of icons. -Technology

Last Answer : Icons refer to graphic symbols that represent window elements. The three types of icons are as follows- the application icon, the shortcut icon and the document icon.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : Give the three terms related to the following: 1. Attacks -Technology

Last Answer : 1. Attacks Trojan horse, Worm, Denial of Service.2. Backup Online backup, Full backup, Differential backup.3. Security software Digital signature, Firewall, Antivirus.

Description : Identify the columns out of the given three, which should not be present in each of the following tables: -Technology

Last Answer : (i) DateofBirth(ii) Admno(iii) Phonenumber

Description : Explain the three main parts of optical fibre cable. -Technology

Last Answer : The three main parts of optical fibre cable are as follows:1. Core It is the section through which the data travel in the form of light.2.Cladding The cladding is the covering part of core. ... Coating It is the outer cover of cladding for the protection of optical fibre from damage and moisture.

Description : Name any three Windows accessories. -Technology

Last Answer : Notepad, Paint, Calculator.

Description : Windows 7 is available in three editions. -Technology

Last Answer : TrueWindows 7 is available in three editions namely- Windows 7 Home Premium, Windows 7 Professional and Windows 7 Ultimate.

Description : Write two points of difference in HTML and XML. Write three points of well_formed XML document. -Technology

Last Answer : Two points of difference between HTML and XML follows:HTMLXMLHTML is a markup language thatcreates the form andappearance of the Web page.XML is a text-based markup language ... and closing tags.3. XML attributes values, should be in double quotation marks.TableWood751stChairPlastic85IInd

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Mention three societal impacts of IT. -Technology

Last Answer : The societal impacts of IT are as follows:1. Opportunities for people with disabilities through artificial intelligence.2. Quality of life improvements due to E-Commerce over the Internet.3. Crime fighting and other benefits.

Description : Mail merge involves three components ………………….. , …………………. and ……………….. -Technology

Last Answer : Mail merge involves three components Main text document,Data sourceandMerged document.

Description : Write three functions that can be performed in Slide Sorter view of a presentation. -Technology

Last Answer : The three functions that can be performed in Slide Sorter view are as follows:1. We can see the entire presentation.2. We can move slide from one place to another using click-drag method. Also, we can rearrange the order of slides.3. We can insert, rename and delete slides.

Description : State three functions of the Slides Pane. -Technology

Last Answer : Three functions of the Slides Pane are as follows:1. New slides may be added to the presentation.2. Allows marking a slide as hidden for not showing it during a slide show.3. Deleting a slide from the presentation in case it is no longer neede

Description : Name three types of law that can help restrict software piracy. -Technology

Last Answer : The following are the three types of law that can help to restrict software piracy:1. Copyright2. Patent3. Trademark

Description : Which three laws are formulated in order to stop software piracy? -Technology

Last Answer : In order to stop software piracy, three types of laws are formulated as follows:1. Copyright is an exclusive right of the developer or author, to protect their works which is granted by law.2. ... . Trademark is the registered word or text/logo depicting the identity of a product, work or company.

Description : According to Majid Tehranian what are the three megatrends that characterize the 21^st century? -Technology

Last Answer : Globalization, regionalization and democratization.

Description : Gunveen, Marshy and Aloha are three developers working on an exciting new app, and the launch day is just a day away. Gunveen creates -Technology

Last Answer : The team members are not working in a systematic way and they are not saving the versions of their work. Changes made in one part of the software can be incompatible with those made by another ... trusted until it's tested. So testing and development proceed together until a new version is ready.

Description : Ms Samtha has many electronics gadgets which are not usable due to outdated hardware and software. Help her to find any three best ways -Technology

Last Answer : 1. Give Your Electronic Waste to a Certified E-Waste Recycler2. Donating Your Outdated Technology3. Give Back to Your Electronic Companies and Drop Off Points.

Description : A Boolean function F defined on the three input variables x, y and z is 1 if and only if number of 1(one) input is even. -Technology

Last Answer : This answer was deleted by our moderators...

Description : apple inc. was founded by three persons : steve jobs and steve wozniak and who was the 3rd founder of apple inc. in april 1976 ? -Technology

Last Answer : Ronald Wayne