Answer:
Following are the solution to the given question:
Explanation:
The cloud-based CRM system may best be used by companies because it has regular releases featuring additional features focused on customer listening and monitoring market dynamics as requirements.
The first stage issue could be the problem faced by the company. When your company demands were appropriately addressed within such a product not already covered by edge case, the decision to build a new CRM may well be justifiable.
Build:
The in-house IT teams have varying skills in CRM design, based on experience. Like databases, information development, and management.We have to construct the integration from scratch.CRM can be developed to match your current business & processes exactly.Whether there is any management issue, you can solve it.We only know in this how in-house CRM it will cost.Hardware & environment in-house systems have had to be configured.Buy:
CRM vendors create a browser system and have support personnel to even get experience.With integrating with the other systems, a CRM system is built.With the most industry in accordance, a vendor establishes a structure that can be modified according to company requirements.CRM bid committee client feedback improvements and fixes.The system is designed and marketed in this respect.And this is immediately hosted ready and hardly ever needs to be configured on this solution.The greatest option for a CRM system would be to establish a large company with many existing IT resources and save money by removing long-term costs for subscriptions. It's doesn't satisfy your requirements by using your existing system. If the company is tiny, you would be able to purchase a leading CRM system that is based on their demands.
Therefore the business pre-purchases most of the CRM system. But it is extremely vital to realize why companies find a custom system if you're choosing for the prebuild solution.
Unfortunately, not all firms were suited to the CRM system.
The largest companies employ Microsoft's dynamics dynamic 365 again for the smallest businesses.
This system below gives techniques to increase efficiency and profitability.
It can offer various benefits if businesses buy a ready-made CRM system
It has a lifetime permit- It is beneficial because you must only CRM once, but you must pay a significant amount for the product.
Or for a certain duration, such as month, year, membership - The cost may be affordable for a subscription but you should pay monthly.
Software copy to put on the computer of your firm.
Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity
Answer:
The algorithm is as follows:
1. Start
2. Capacity = 100%
3. Input Status (True/False)
4. While Status == True
4.1. Read Quantity (%)
4.2. Capacity = Capacity - Quantity
4.3. If Capacity < 40%
4.3.1 Display Yellow Flash
4.4. Input Status (True/False)
5. Stop
Explanation:
This starts the algorithm
1. Start
The capacity of the machine is initialized to 100%
2. Capacity = 100%
This gets the status of the sales
3. Input Status (True/False)
The following iteration is repeated until the status is false
4. While Status == True
Read current sales quantity from the user
4.1. Read Quantity (%)
Remove the quantity from the capacity
4.2. Capacity = Capacity - Quantity
Check is capacity is below 40%
4.3. If Capacity < 40%
If yes, display yellow flashes
4.3.1 Display Yellow Flash
This gets the status of the sales
4.4. Input Status (True/False)
End algorithm
5. Stop
Give three reasons to use a hard drive as mass storage.
Answer:
With that in mind, let's take a look at five places where hard drives shine.
Backups and Archives. ...
Media Libraries. ...
Large Capacity Storage. ...
NAS Drives and Security. ...
RAID Arrays. ...
Other Uses.
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)
Answer:
r = 1
Explanation:
Average processing time ( p ) = 3 minutes
Average inter-arrival time ( a ) = 3 minutes
number of servers ( m ) = 3
Determine the value of r
r ( offered load ) = p/a
= 3 / 3 = 1
∴ value of r ( offered load ) = 1
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?
a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.
Answer:
C
Explanation:
7. System software is the set of software programs that helps run the computer and coordinates instructions between application software and hardware devices. It consists of the operating system (OS) and utility programs. How does the mindset of the designer affect the design of the operating system (e.g., Windows vs. Linux)
Answer:
Explanation:
The main goal when designing an operating system (OS) is to make sure that the system is as efficient and intuitive as possible. This is the mindset that designers have when creating the operating system. However, this also creates drastically different designs between designers, mainly because one design structure will feel much more natural and intuitive to one designer but not another. Since the designer's own personal taste/mindset drastically affects the design, most companies find their target audience and survey/test various designs. This is done in order to find what features and styles best fit the vast majority of the people.
A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.
What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?
Answer:
Fiber Optic, it allows for speeds up to 1200 mbps
Explanation:
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.
a. True
b. False
what is the python ?
Answer:
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
This is my Opinion.
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
Hope this helps you :)
At the Greene City Interiors branch office, you have been asked to implement an IP network. Your network ID is currently192.168.1.0/24. You need to divide this in half network (two subnets) to accommodate hosts on two separate floors of the building, each of which is served by managed switches. The whole network is served by a single router.
Based on the above scenario, answer the following questions:
1. To divide the network in half, what subnet mask do you need to use?
2. What are the subnet IDs for each network?
3. Your manager is not satisfied with the new subnet scheme and wants to reduce the number of subnets to make more hosts and addresses available in each subnet. Is there a way to use the same subnet for the two floors of the office?
Answer:
3 is your correct answer
Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices
Answer:
name is a reserved word in JS and cannot be used as an identifier
Explanation:
From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()
Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted
format please? i cant understand
Irene llegó tarde al colegio_______________
ayúdenme
^_^^_^^_^^_^^_^^_^^_^^_^^_^
Answer:
Explanation:
Absconding
https://ref.surveyj.co/Oware111
What is the link?
IS IT A HACKING LINK
Identify the statement about Windows tasks that is FALSE.
To launch an application, click the Windows icon, select "All Programs," and then click an application.
The boot process is the process for powering off a computer.
A common way to shut down the computer’s operating system is by using the Start menu.
Users log into their accounts on the Welcome screen, before Windows is ready to use.
The statement about Windows tasks that is FALSE is
The boot process is the process for powering off a computer.According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.
As a result of this we can see that in launching an application;
we need to click on Windows iconselect "All Programs," click an application.Therefore, The boot process is not the process for powering off a computer.
Learn more about Windows tasks .
https://brainly.com/question/1594289
The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.
The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.
Learn more about the boot process here.
https://brainly.com/question/24355262
#SPJ6
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task
Question Completion with Options:
A. device flow correlation
B. simple detections
C. application blocking list
D. advanced custom detections
Answer:
The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:
C. application blocking list
Explanation:
The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks. Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.
continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.
AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless
Answer:
IaaS (Infrastructure as a Service)
"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
558c::d367:7c8e:1216:0:66be
A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents
Answer:
D. Excessive disk space consumption due to storing large documents.
Explanation:
When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.
__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software
Answer:
a then c
Explanation:
Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands
Answer:
d.) The operating system, the application software
Which option is used in order to configure switchboards for a complex database?
Switchboard Manager
Global Options
Quick Search
Database Formatter
worth 100 points
Answer:
switch board manager
Explanation:
Output is the act of is the act of entering the data to the computer?
Answer:
Output is the act of the computer display information based on your input
Explanation:
Funny thing is that output is the exact opposite of what you just described
11111 Power 2 sovle
Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:
A > 0
B > 0
C > 0
Answer:
The program in Python is as follows:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
while A<=0 or B <= 0 or C <= 0:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
print("Valid inputs")
Explanation:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
The loop is repeated until inputs for A, B and C are above 0
while A<=0 or B <= 0 or C <= 0:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
Print valid inputs when user inputs are correct
print("Valid inputs")
To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure
Answer:
Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.
Explanation:
To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.
For example, we may need to store the address of an entity employee in a structure.
Which statement is accurate to describe a spreadsheet versus an Excel workbook?
a) worksheets have one or more workbooks.
b) workbooks have one or more worksheets.
c) workbooks are the same as word documents.
d) worksheets always refer to real paper.
how to not addUse methods to: 1. Get a String from the user at the command line 2. Populate an ArrayList of Character data (the wrapper class), with each char in the String represented as a separate Character element in the ArrayList 3. Output each Character to the command line, each on a separate line space into my array list
Answer:
Explanation:
The following code is written in Java. It asks the user to enter a string. Then the program loops through the string and separates the string into an ArrayList of characters. Finally, it outputs each character separately on a its own line.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter a String: ");
String answer = in.nextLine();
ArrayList<Character> charsList = new ArrayList<>();
for (int i = 0; i < answer.length(); i++) {
charsList.add(answer.charAt(i));
}
for (char x: charsList) {
System.out.println(x);
}
}
}
A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised
Answer:
computer.
Explanation:
it uses data that is labeled to train.