1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anuta_ua [19.1K]
3 years ago
9

Hilary works at Klothes Kloset. She quickly helps the customers, and her cash drawer is always correct at the end of her shift.

However, she never tries to "upsell" the customers (for example, by asking if they would like to purchase earrings to go the shirt they chose or by suggesting a purse that matches the shoes they are buying). In a paragraph of no less than 125 words, give Hilary some constructive feedback on her performance.
Computers and Technology
1 answer:
Alona [7]3 years ago
3 0
I'm literally doing the same lesson/question right now. I couldn't put it in 125 words because it really isn't that serious. I don't know why they ask for so many words when the answer is short and straight to the point. But what I put was:
<span>It's good that she's doing what she's supposed to do, but its better to go above and beyond; why not try to sell more to the customers? If you have the opportunity to directly talk to the customer and have an influence over their purchase, than why not try to offer them other products to benefit the company?
</span>Also, just a quick question, if you are using ignitia, do you like it?
Hope this helps!
You might be interested in
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
3 years ago
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
Lina20 [59]

Answer:

go to a authorised site which is secure

Explanation:

5 0
3 years ago
50 POINTS! PLEASE HELP!
Basile [38]

Answer:

NAT

Explanation:

The Network Address Translation (NAT) is a Virtual Machine Software which allows organizations to make use of a single Internet Protocol by altering the private network addresses to a private one. It makes it possible to Map multiple network addresses to a public address thereby providing security. The NAT VMware allows a single device such as a router provide an information transfer interface between a private and public network. Hence, it does not use the physical network of the computer.

8 0
3 years ago
Why microcomputers are installed with TCP/IP protocols
Cerrena [4.2K]

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

Explanation:

4 0
3 years ago
Why do i answer questions/ ask questions on brainly and then the points don't show up????
Alchen [17]

Answer:

Good question

Explanation:

5 0
3 years ago
Other questions:
  • Select the correct answer.
    6·1 answer
  • . The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turni
    14·2 answers
  • The basic work area of the computer is it screen that you when you first fire up your computer
    6·1 answer
  • Driver’s License Exam The local driver’s license office has asked you to create an application that grades the written portion o
    9·1 answer
  • TWO QUICK QUESTIONS
    12·1 answer
  • In Windows Vista, which button is used to create a new folder?
    7·1 answer
  • What is the relationship between interoperability and the other quality attributes highlighted in this book? For example, if two
    5·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • Which feature allows users to see all suggestions for edits to a document at once?
    7·2 answers
  • How does technology affect our daily lives essay
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!