1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
2 years ago
15

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Computers and Technology
1 answer:
Pavel [41]2 years ago
4 0
They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures
You might be interested in
By Definition, a Small Business?
Strike441 [17]

Answer:

A small business is a privately owned and operated business. A small business typically has a small number of employees.

Hope this helped you!

Explanation:

4 0
3 years ago
We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
sleet_krkn [62]

Answer:

1, I would not be able to contact anyone, or call for help.

2, Stores like Apple would lose their purpose.

3, Life would be boring and dull.

  • i hope that helped at all.

4 0
3 years ago
Which of the following words best describes the word icon ​
Usimov [2.4K]

Answer:

symbol

Explanation:

7 0
3 years ago
Read 2 more answers
What’s the purpose of balancing or monitoring your checking account?
emmasim [6.3K]
B) To help you calculate how much money you have in your account.
3 0
3 years ago
Read 2 more answers
Does my computer have virus?
vivado [14]

Answer:

does your toothpaste have salt?

6 0
2 years ago
Read 2 more answers
Other questions:
  • Information systems security is the collection of activities that protect the information system and the data stored in it.
    12·1 answer
  • A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af
    11·1 answer
  • ____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast
    15·1 answer
  • The establishment called ABC Enterprise requires a Java program to keep a database of the inventory of the products that it sell
    8·1 answer
  • The flynn effect best illustrates that the process of intelligence testing requires up-to-date ________
    14·1 answer
  • This type of connection is best to use when downloading large files on a network.
    10·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • U $ er Ideas for R 0 B 1 0 X?
    12·2 answers
  • Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.
    8·1 answer
  • NO LINKS Please
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!