1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
2 years ago
8

When patel’s advertising co. decided to upgrade its computer network, many people were involved in the decision. In b2b buying s

ystems, decisions are often made:_____.
Computers and Technology
1 answer:
babunello [35]2 years ago
4 0

In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

<h3>What is Business-to-Business service?</h3>

Business-to-business is known to be a kind of a scenario where one business is said to often makes a commercial transaction with another kind of business.

The B2B decision-making process is known to be made up of some discrete tasks such as:

  • Knowing that there is an issue or need.
  • Examining  and comparing the available alternative or solutions
  • Defining the requirements that is needed for the product and others.

Hence, In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

Learn more about b2b from

brainly.com/question/26506080

#SPJ1

You might be interested in
Select the correct answer.
ale4655 [162]

Answer:

I think it's B

Explanation:

6 0
3 years ago
Read 2 more answers
An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
babunello [35]

The S3 encryption, <u>Server-Side Encryption with Customer-Provided Keys (SSE-C)</u>, allows the company to leverage Amazon S3 for storing data with given constraints.

What do you mean by S3 encryption?
S3 encryption <u>encrypts your </u><u>data </u><u>when it is written to disks in its </u><u>data </u><u>centers at the </u><u>object </u><u>level and decrypts it for you when you </u><u>access </u><u>it.</u> There is no distinction between accessing encrypted or unencrypted items as long as you authenticate your request and you have access permissions.

S3 encryption<u> </u><u>encrypts an item before saving it to disk when you use server-side </u><u>encryption</u><u>; the </u><u>object </u><u>is then decrypted when you download the object</u>. S3 encryption lets you safeguard the data you store in AWS S3 buckets online, which is crucial for sensitive data.

To learn more about S3 encryption, use the link given
brainly.com/question/9979590
#SPJ4

4 0
1 year ago
Which of the following is not a type of bank?
andreyandreev [35.5K]
Where is the following banks that is listed?
3 0
3 years ago
Read 2 more answers
PLEASE HELP THIS IS CONFUSING ME
Artemon [7]

Answer:

The answer is:

Yes, because Antonio clearly copied someone else's words.

Explanation:

It is still forbidden to plagiarize Wikipedia despite it being a Open-Source Data base of information. This means, unless you directly cite in a bibliography or with in-text citations, the article, the author, and everything else needed in the proper citations for the format, it is plagiarism.

3 0
3 years ago
Read 2 more answers
Edhesive 9.10 Question 3
Ede4ka [16]

Answer:

your on unit 9 of edhesive?

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given
    9·1 answer
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • How is IT related to new business initiatives?
    6·1 answer
  • What component of a computer system holds the operating system when the computer is not running
    6·2 answers
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • _____ describes the layout of the screen. Block-based, Interface, Editor, Player
    11·2 answers
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • 15. Question
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!