1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
4 years ago
8

Compare and contrast an example of an actual company that has a brick and mortar location with an actual company that does not h

ave a brick-and-mortar location.
Computers and Technology
1 answer:
jok3333 [9.3K]4 years ago
6 0

Answer: Walmart and Amazon

Explanation: A brick and mortar store is one that, at least, has a physical location, for example, a Walmart store, which still remains a fairly strong advantage: many people still generate more memory to access a physical space; on the other hand, a store that does not have a brick and mortar location, such as Amazon, begins sending emails before special seasons, being a great strategy because they create in the consumer the urgency of acquiring the product.

You might be interested in
You need to secure your wireless network. which security protocol would be the best choice
natka813 [3]
Changing the password. whenever you change the password of your router, it disconnects all current devices, including ones you don't want to be connected. from there, reconnect the devices you want on the network and then you are done!
7 0
3 years ago
Using ______, a smartphone can connect to an automobile audio/control system
lys-0071 [83]
<span>Using bluetooth, a smartphone can connect to an automobile audio/control system</span>
5 0
3 years ago
A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S
LenaWriter [7]

Answer:

The answer to this question can be given as:

To access the server, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

Explanation:

In this question, the user doesn't access the server by the User name and password. The User wants to access the server by the computer-level authentication. To access the server successfully user must Configure L2TP with IPsec and MS-CHAPv2. where L2TP with IPsec stands for Layer 2 Tunneling Protocol or it is also known as Virtual private network. It is a communications protocol that allows us to move data from one network to another in the encrypted form that is used by the IPsec. MS-CHAPv2 stands for Microsoft Challenge-Handshake Authentication Protocol that is developed by Microsoft. In computing, the CHAP provides the authentication to the user or network host entity. For example, this entity may be an internet service provider. And v2 stands for security.

So to access the server successfully, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

8 0
3 years ago
Remember to check the on your vehicle first to see if a repair is covered by the manufacturer.
krok68 [10]

Answer:

insurance or warranty

Explanation:

It should be insurance because insurance can cover things like car repairs and other things that goes wrong. warranty could work too because it kind of means the same thing.

5 0
4 years ago
The ____ area on the status bar includes six commands as well as the result of the associated calculation on the right side of t
Natali [406]
The answer is "Autocalculate Area"

In Microsoft Office, especially in Excel, the autocalculate area can be found on the status bar. It has six commands namely: average, count, numerical count, minimum, maximum, and sum. The six commands are the result of the associated calculation.
8 0
3 years ago
Other questions:
  • Se citește un număr natural nenul N. Se umple, pe linii, partea de sub diagonală, inclusiv aceasta, a unui tabel pătratic de dim
    9·1 answer
  • Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and en
    7·1 answer
  • Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the har
    7·1 answer
  • What is the general form of an internet email address<br>​
    5·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
  • You’ve been hired to help a bank automate their deposit/withdrawal system! Your task is to write a Python program that interacts
    6·1 answer
  • HELP ME PASS!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!