1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
15

Two major B2B models are ________. Select one: a. Auctions and social commerce b. Catalogs and vertical markets c. Sell-side mar

ketplaces and e-sourcing d. Outsourcing and horizontal markets
Computers and Technology
2 answers:
Neporo4naja [7]3 years ago
7 0
The answer could be a i might be wrong
Sergio [31]3 years ago
3 0
<h2>Answer:</h2>

The major two B2B models are <u>c. e-sourcing and sell-side marketplaces</u>.

<h2>Explanation:</h2>

B2B is a business to business model which means the exchange of goods or services which happens between corporations or organizations but not with customers. It is providing services or goods online to other company. Example, a cyber-security firm providing online service to an e-commerce company as part of risk mitigation plan to avoid credit card fraud.

The advantage of such model is sustainable and high-profit margin from repeated clients.

One disadvantage is this model will be having a smaller number of customers.

You might be interested in
Differentiated instruction is designed to educate children through ________ techniques in order to ensure every student is being
EleoNora [17]
They use multiple techniques to help children. 
7 0
3 years ago
Whats my screen name?
adoni [48]
It could be any thing of your chose
8 0
4 years ago
Read 2 more answers
What are the three main sub-sectors in the IT-BPM industry?<br>IT class 9​
sergeinik [125]

Answer:

Business Process Managment.

Software Products.

Engineering Research and Development

8 0
3 years ago
Safety interlock module operates by monitoring the voltage from the
mario62 [17]
The answer to this question, is B: Ignition coil
4 0
3 years ago
The availability of trustworthy ________—coding and decoding—technologies that make online use of credit and bank card numbers,
Jobisdone [24]

Answer:

Encryption

Explanation:

Encryption is the process of coding and decoding data or information (credit and bank card numbers, addresses, social security numbers, and other sensitive information) in such a way that only authorized parties can access it and those who are not authorized cannot.

7 0
3 years ago
Other questions:
  • What type of socket should be used with an air impact wrench
    12·1 answer
  • When driving a truck is fuel crucial
    9·1 answer
  • How do u feel about distance learning in a paragraph?
    6·2 answers
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • Computers are classified by price, processing speed, capacity, and
    11·1 answer
  • PLEASE HELP ME!!!!
    12·2 answers
  • Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to bo
    12·1 answer
  • The online underground is used _____. Select 3 options. by law-abiding citizens only on Black Friday for networking by criminal
    11·1 answer
  • Long answer questions.
    13·1 answer
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!