1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
3 years ago
8

Is amazon a e-commerce website o true o false

Computers and Technology
2 answers:
klemol [59]3 years ago
6 0

Answer:

It is an online shopping website.

Montano1993 [528]3 years ago
5 0
It’s online shopping.. so ig
You might be interested in
Compared with a star topology, a hierarchical topology: a. is more effective at handling heavy but short bursts of traffic. b. a
Eduardwww [97]

Answer:

c. offers a great deal of network control and lower cost.

Explanation:

A network topology can be defined as a graphical representation of the various networking devices used to create and manage a network.

Compared with a star topology, a hierarchical topology offers a great deal of network control and lower cost.

4 0
3 years ago
Identify the following verb by number and person by checking on the appropriate boxes.
Makovka662 [10]
Second person ig Imao yeah
3 0
2 years ago
Read 2 more answers
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
Landslides often accompany earthquakes and volcanoes and pose an additional threat to humans after these events.
xxTIMURxx [149]
I think the answer is tur
5 0
4 years ago
In order to "print" the data in an object, the class should override the _____ method.
Olegator [25]

Answer:

toString is right Answer

Explanation:

If you want to represent any object as a string, toString() method comes into existence.  

The toString() method returns the string representation of the object.

If you print any object, java compiler internally invokes the toString() method on the object. So overriding the toString() method, returns the desired output, it can be the state of an object etc. depends on your implementation.

7 0
3 years ago
Other questions:
  • The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transport Agent c
    5·1 answer
  • Leah deals with several file conversions every day.
    7·1 answer
  • On a spreadsheet, this is the term for a grouping of cells that touch each other and form a rectangle. An example of it would be
    13·1 answer
  • How long would it take a 8 bit computer to calculate π to the thousandth place?
    8·1 answer
  • Toby has lost valuable data on his computer a number of times due to system crashes caused by viruses. He decides to invest in a
    13·1 answer
  • Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe
    8·1 answer
  • A SOCCER club uses ICT to
    10·1 answer
  • What is output? Select all that apply. c = 0 while (c &lt; 10): c = c + 5 print (c) 0 1 2 3 4 5 6 7 8 9 10
    10·1 answer
  • What is speaker?.....​
    13·1 answer
  • (10 LC)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!