1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
12

What is drop shipping and how it works on amazon?

Computers and Technology
1 answer:
labwork [276]3 years ago
7 0
Drop shipping and how it works is you ship your products to Amazon where they carry the inventory and ship directly to your customers when you are starting a business
I am pretty sure
You might be interested in
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
What is star topology
Alexxx [7]
Every node connects to a central network device. like a hub, switch, or computer.
4 0
3 years ago
Read 2 more answers
Which statement describes part of the meeting scheduling process? It is always an all-day event. It is created in a single calen
olga nikolaevna [1]

Answer:

is there a pic or something, sorry i cant help at the time being

Explanation:

5 0
3 years ago
The numeric keys on a keyboard or calculator are referred to as a:
Anna [14]

Numeric Keypad is the answer

6 0
3 years ago
One of the most toxic components of a computer is the _________.a. plastic in the keyboardb. silicon in the glass of the compute
Burka [1]

Answer:

C. Lead embedded in the glass of the monitor.

Explanation:

Cathode Ray Tube (CRT) monitors have lead embedded in their glass. Exposure to small quantities of lead can lead to lead poisoning. There are about 2.2 kilograms of lead in a big CRT monitor.

This amount of lead is mixed with the glass to improve the optical quality and to stop radiation from affecting the user.

Exposure to lead can cause the following:

  1. Constipation.
  2. Irritability,
  3. Headaches
  4. Aggressive behavior and so much more.
3 0
3 years ago
Read 2 more answers
Other questions:
  • William found out that someone used his report on American culture without his permission. What is William a victim of?
    13·2 answers
  • The process of saving files to disk is called.<br> A.read<br> B. Write<br> C. Lock<br> D. Protect
    6·1 answer
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • What is the printout of the call nPrint("a", 4)?
    14·1 answer
  • Assume the following instruction mix for some program:______.
    8·1 answer
  • Potatocat2UwU da best
    12·1 answer
  • Why do some people think the global<br> economy is good for the United States?
    10·1 answer
  • Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second lin
    12·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • Image-editing software is used to _____.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!