1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
2 years ago
8

When patel’s advertising co. decided to upgrade its computer network, many people were involved in the decision. In b2b buying s

ystems, decisions are often made:_____.
Computers and Technology
1 answer:
babunello [35]2 years ago
4 0

In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

<h3>What is Business-to-Business service?</h3>

Business-to-business is known to be a kind of a scenario where one business is said to often makes a commercial transaction with another kind of business.

The B2B decision-making process is known to be made up of some discrete tasks such as:

  • Knowing that there is an issue or need.
  • Examining  and comparing the available alternative or solutions
  • Defining the requirements that is needed for the product and others.

Hence, In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

Learn more about b2b from

brainly.com/question/26506080

#SPJ1

You might be interested in
What is the name of the image window area that identifies the project you are working on?
Natali5045456 [20]
The answer is the title bar becuase it would tell the name of the project or something else such as when you are using Words then it would tell you the name of the title of the document you are doing.
6 0
4 years ago
Read 2 more answers
A technician who is managing a secure B2B connection noticed the connection broke last night. All networking equipment and media
pashok25 [27]

Answer:

<u>d. CRL</u>

<u>e. OCSP</u>

Explanation:

Note, the term PKI stands for Public Key Infrastructure.

Among all the PKI components, the CRL (CERTIFICATE REVOCATION LISTS), which contains a list of issued certificates that were later revoked by a given Certification Authority, and the PFX format used for storing server certificates should be examined by the technician use to validate his assumption.

7 0
3 years ago
Below, we’ve provided a for loop that sums all the elements of list1. Write code that accomplishes the same task, but instead us
Tanzania [10]

Answer:

Explanation:

The code that would best accomplish this task using a while loop would be the following:

list1 = [8, 3, 4, 5, 6, 7, 9]

accum = 0

n = 0

while n < 7:

        accum += list1[n]

        n += 1

This code will continue throughout the list1 array and add every value to the accum variable.

5 0
3 years ago
An employee was watching Jessica, an IT employee, typing in many different confusing terms. Jessica explained that she needed to
zzz [600]

Answer:

Programming and Software Development

Explanation:

8 0
3 years ago
Read 2 more answers
5. What are looping or interactive statements? which
tankabanditka [31]
Looping statements are statements which execute one or more statements repeatedly a several number of times. Specifically when you need to execute a block of code in less time, less memory and etc, the looping concept is necessary.


Python provides many different ways for executing loops. While all the ways provide similar basic functionality, they differ in their syntax and condition checking time...

The while loop: used to execute a block of statements repeatedly until a given a condition is satisfied. (And when the condition becomes false, the line immediately after the loop in program is executed.)

The for loop: used for sequential traversal

(Includes)
- looping through a string
- Break statements
- Continue statements
- range() functions
- else statements
- nested loops


8 0
3 years ago
Other questions:
  • To apply format to text, both the text and the text box must be selected.
    13·1 answer
  • There are several reasons it’s important to use the right tool and the right size tool for the job, but the most important reaso
    8·1 answer
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • Use the drop-down menus to correctly complete these sentences about common data types.
    12·1 answer
  • What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
    9·1 answer
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
    8·2 answers
  • To create a program in Scratch, you need to think systematically about the order of steps. This is known as
    11·1 answer
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!