1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?

Computers and Technology
1 answer:
VMariaS [17]3 years ago
6 0

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

You might be interested in
The frame work for storing records in database is a
andreev551 [17]
The frame work for storing records in database is a report. (b)
3 0
3 years ago
So what do I do if it doesn't take me to the sign up page? I
vesna_86 [32]

Answer:

Try to restart the computer or something.

Explanation:

8 0
3 years ago
There is one clear definition of IT. True False
Elenna [48]

Answer:

That is False. it has more definitions not only one.

8 0
3 years ago
What makes this information systems environment unique? (3 points)
QveST [7]

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

6 0
3 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
4 years ago
Other questions:
  • A field that will always have a unique value is
    15·2 answers
  • Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
    15·2 answers
  • N, or central processing unit, is also known as the
    10·2 answers
  • Out of a list of the values 8, 3, 30, 5, 15, and 6, what result would the MIN function return?
    9·2 answers
  • How can you change your mindset ? What are some fears you have had to overcome related to school ?
    10·1 answer
  • What will happen when you drag and drop a worksheet tab into another workbook WITHOUT holding the Ctrl key down?
    13·2 answers
  • Hi<br>is it right?<br>"I think there is a small mistake in the quotation(second not first)"​
    5·1 answer
  • Please help i have 15 mins
    5·1 answer
  • Ismael is examining a report in Access. He needs to access a view that will be used to examine and change the structure of the r
    9·2 answers
  • Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!