1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
4 years ago
8

A store that has both an e-commerce site as well as a physical store (building) is known as:

Computers and Technology
1 answer:
Zanzabum4 years ago
4 0

Answer: b) Click and mortar model

Explanation: Click and mortar model is the model that depicts both offline as well as online operation units. The have the benefit of providing face to face marketing of products as well as online transaction and trading. The main example of the click and mortar model is any company having online website as well as offline store. e.g.- Nykaa cosmetics.

Other options are incorrect because pure play model is used for selling goods through online method e.g.- Amazon Inc. and brick and mortar model is the only offline method for the marketing of products e.g.- local shops.Thus, the correct option is option(b).

You might be interested in
What should you do when you are working on an unclassified system and receive an email.
koban [17]

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

3 0
2 years ago
Technician a says that impact sockets have thicker walls than conventional sockets. Technician b says that impact sockets have a
Ray Of Light [21]

Impact sockets are sockets used to cope with the vibration caused by the impact of the hammer on the anvil. Both technicians are right. It is true that impact sockets have thicker walls than conventional sockets, so technician A is right. But it is also true that impact sockets have a black oxide finish, so the technician B is also right.

4 0
3 years ago
. ____ view displays the slides so that they almost fill the screen, and a status bar appears identifying the number of the curr
Mars2501 [29]
Reading view.  i checked on powerpoint

4 0
3 years ago
A place where people study space​
fgiga [73]

Answer:

a place where people study space is a Spacey agent

4 0
3 years ago
NO LINKS!! HELP!!! PHOTOGRAPHY CLASS ESSAY 2
liraira [26]

2. What is special about photographs?

Photographs are special because it shows all of the artistry and reflects the eye of the person who took the photo, not only that but it also shows how the photographer shot it, it shows a whole new meaning because of that.

3. In order to be a great photojournalist one must be okay being behind a camera, and you would also need to know how to edit photos well and bring out the story in the photo.

I know I haven't answered all of the questions, but this is all I can do because I don't have other resources to help you with.

My answers should only be used as last minute answers!!!! (or you can just use mine if you want)

7 0
3 years ago
Read 2 more answers
Other questions:
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • Microsoft Windows is automatically launched when you turn on your computer
    6·1 answer
  • _____ is the unauthorized entry into a computer system via any means
    9·1 answer
  • Jacob wants to be a Steamfitter. He just finished his associate’s degree. Which best describes what he should do next?
    10·2 answers
  • How to build a 5*32 decoder by using 3*8 and 2*4 decoders? (digital design)
    15·1 answer
  • Which is the most efficient way to make the text in a row bold in every worksheet in the file?
    12·2 answers
  • Which of the following describes an executive information system (EIS)?
    11·1 answer
  • What are some specific ways that businesses use the internet?
    6·2 answers
  • When measuring processor speed,a megahertz is much faster than a gigahertz.true or fals
    12·1 answer
  • Malware is any malicious software installed on a computer or network without the owner’s knowledge.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!