1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
4 years ago
5

3 Points

Business
1 answer:
tangare [24]4 years ago
6 0

Answer:

C - An online boutique

Explanation:

E-commerce refers to commercial transactions that are done online through the internet. This implies that whenever we purchase and sell something through the Internet, you are concerned with e-commerce. There are multiple ways to list e-commerce websites.we can classify them according to the commodities or services that they sell, the people that they transact with, or even the platforms on which they work.

An online boutique is an example of E-commerce because it is being done through the internet.

You might be interested in
For each of the following events, explain the short-run and long-run effects on output and the price level, assuming open econom
Westkost [7]

Answer:

High prices of products as well as increases poverty.  

Explanation:

The stock market declines sharply, reducing consumers’ wealth that leads to high prices of products as well as increases poverty.  The federal government increases spending on national defense that decreases the foreign reserves and money for other fields of the country. A technological improvement raises productivity which increases the economy of the country as well as standard of living. A recession overseas causes foreigners to buy fewer U.S. goods that leads to lower income of the country and purchasing power of the country. Due to this, there is less money for other fields and institutions.

3 0
3 years ago
Read 2 more answers
Zip Games purchases blank DVD disks onto which it copies its software for sale through its mail
nikklg [1K]

Answer:

a. 575 units

b. 107.83 orders

c.  3.38 days

Explanation:

a. The computation of the economic order quantity is shown below:

= \sqrt{\frac{2\times \text{Annual demand}\times \text{Ordering cost}}{\text{Carrying cost}}}

where,

Annual demand = 62,000 disk

Ordering cost = $16

Carrying cost = $0.25 × 24% = $6

Now put these values to the above formula  

So, the value would equal to

= \sqrt{\frac{2\times \text{62,000}\times \text{\$16}}{\text{\$6}}}

= 575 units

b. The number of orders would be equal to

= Annual demand ÷ economic order quantity

= 62,000 ÷ 575 units

= 107.83 orders

c. The frequently order would be

= Total number of days in a year ÷ number of orders in a year

= 365 days ÷ 107.83 orders

= 3.38 days

5 0
4 years ago
"An investor that has been unaffiliated with the issuer for at least 3 months is permitted to sell restricted shares under Rule
Travka [436]

Answer:

six months

Explanation:

Restricted shares are form of securities that are gotten in private sales, from an affiliate of the issuer or through an issuing house. Basically, restricted securities are a form of compensation given to investors in exchange for providing start up capital to a company hence are issued through employee stock benefit plans, private placements, regulation offerings etc.

According to rule 144, before an investor could sell any restricted securities in the market place, such securities must be held for a certain period of time, usually six months for a reporting company, who is subject to the reporting requirements of SEC 1949.

However, where the issuer of the securities is not subjected to reporting requirements of SEC, then the investor could hold them for a period of one year.

4 0
3 years ago
Describe the method of write off?
FrozenT [24]
I need more details to answer this
8 0
3 years ago
Biometrics (retinal scans, fingerprints, and the like) are mainly used for ____ by large security-minded entities such as bankin
Novosadov [1.4K]

Answer:

Authentication

Explanation:

Authentication involves the process of verifying the identity of a device or person. Authentication is necessary in order to allow only the authorized person have access to a place, a device or a thing.

Authentication types includes;

  • Continuous authentication
  • Digital authentication
  • Project authentication
7 0
4 years ago
Other questions:
  • What is a limited company?
    5·1 answer
  • In a market system, how are the terms of exchange established?
    11·1 answer
  • Equilibrium occurs when supply and demand coordinate to
    15·2 answers
  • Real estate agents promoting a new recreational development offer a free breakfast and the opportunity to win a trip to Hawaii f
    13·1 answer
  • A car dealer acquires a used car for $12,000, with terms FOB shipping point. Compute total inventory costs assigned to the used
    13·1 answer
  • Aria’s, Inc. has 1,000 shares of 5%, $100 par value cumulative preferred stock and 10,000 shares of $1 par value common stock ou
    10·1 answer
  • I need help on these two. 15 pts. Brainliest...
    12·1 answer
  • The following information is available for Coronado Company: Sales Revenue $389600 Freight-In $29300 Ending Inventory 37400 Purc
    15·1 answer
  • Reuse of large amounts of copyrighted film in a documentary would not constitute a copyright infringement.
    12·1 answer
  • Can we talk about the political and economic state of the world right now
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!