1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?

Computers and Technology
1 answer:
VMariaS [17]3 years ago
6 0

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

You might be interested in
Can Sombody please help me with this question, I'm struggling!
hjlf

Answer:

umm let me check if my answer is right

Explanation:

3 0
4 years ago
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users ac
Lerok [7]

Answer:

it will make the wireless network faster and it is a performance network i am pretty sure.

Explanation:

5 0
3 years ago
4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
natima [27]
In side the Hard drive there is a  <span> large shiny, circular "plate" of magnetic material called a </span>platter<span>, divided into billions of tiny areas called clusters. This Plate haves a pin over it that reads all the information that is on it. When this plate or pins damage thats when the hard drive need to be replace.   </span>
8 0
3 years ago
Is there anyone willing to sign into my google classroom account and help with my work :( i had surgery on monday and have about
Soloha48 [4]

Answer:

yeah I can help u but how will I get ur email and password?

3 0
3 years ago
Read 2 more answers
Which hexadecimal number equal 11000101
Ket [755]
(11000101)2<span> = (C5)</span>16<span> = C5h so your final answer is C5 or in decimal it is 197</span>
3 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Business Risks are ​
    15·1 answer
  • What does the word tolerance mean in textiles?
    9·1 answer
  • what are Include the data on usage you gather from your interactions with friends or by listening to people on the radio or on T
    7·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • Please I need this answer now.<br>this is the fill in the blanks​
    14·1 answer
  • Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
    6·1 answer
  • Ill give brainliest if possible
    13·2 answers
  • PLS HELP I GOT 30 MINS TO TURN THIS IN!!!
    7·2 answers
  • All HTML5 webpages must begin with the HTML element _____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!