1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRa [10]
3 years ago
8

Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se

ll to Fordham3 Hardware should
a. focus on providing information to and making the sales approach to the one decision maker.
b. address the concerns of all members of the buying center with particular attention to the decision maker.
c. focus exclusively on the head of the buying center.
d. attempt to facilitate the collective agreement of all members of the buying center.
e. attempt to get one friend on the committee to support his products.
Computers and Technology
1 answer:
balandron [24]3 years ago
8 0

Answer: (c) focus exclusively on the head of the buying center.

Explanation:

As Fordham3 Hardware is known for its consensus buying center culture, so someone attempting to sell to Fordham3 should focus exclusively on the head of the buying center.

You might be interested in
Can someone please help me
inn [45]

A pallet jack is a manually operated forklift

3 0
4 years ago
What does the asterisk (*) after select tell the database to do in this query?
OlgaM077 [116]

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

<h3>What does asterisk (*) mean in SQL?</h3>

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

4 0
2 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Which of the following must be true for hydropower to work?
Nastasia [14]

95% sure its there must be waves

5 0
2 years ago
How do you change your password on this? This isn’t really a “Question” but....
MissTica
You go to edit profile and press the change password button.  click on profile pic
5 0
4 years ago
Read 2 more answers
Other questions:
  • 1. Which of the following is required to create a computer simulation?
    11·1 answer
  • A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
    13·1 answer
  • 1.  
    15·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • What are the missing letters _A_TO_ ( 6 letters) a type of computer.
    13·2 answers
  • Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
    9·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • Rudy accidentally sent a sensitive work report to a personal friend named James instead one of his co-workers, who is also named
    6·1 answer
  • The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!