Answer: (C) A special service for current customers
Explanation:
The CRM is the customer relationship management that typically use by the banks for providing special type of services to the current customer. This is the way to attract various types of users or customers by providing some special type of offers.
According to the question, bank provide the credit card offers to the customer on the airline tickets so, it is beneficial for both the customer and for the bank as well.
Answer:
The answer is "SPAN"
Explanation:
The full form of SPAN port is "Switch Port Analyzer", which is used to designed specifically for the interface on a network device, that would be able to monitor all traffic passing across the entire device.
- The use of this port will also call the mirror ports, that is a popular way of gathering data traffic for tracking purposes.
- It is primarily used to access the bus switch and all interfaces, which is usually accessible from data transmission.
D. (chart elemments) - correct answer
Servers that exist within a data center that is publicly accessible on the internet are referred to as on-premises servers: b. false.
<h3>What is a server?</h3>
A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.
<h3>What is an
on-premises server?</h3>
An on-premises server can be defined as a type of server that are privately owned by a company or individuals, which must be managed and maintained individually.
In conclusion, servers that exist within a data center that is not publicly accessible on the internet are generally referred to as on-premises servers.
Read more on servers here: brainly.com/question/27960093
#SPJ1
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.