1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
4 years ago
11

Which is part of the dales process A customer retention B billing C cost planning D customer relations

Computers and Technology
1 answer:
serious [3.7K]4 years ago
6 0

Answer:

D customer relations

Explanation:

A sales process is a term that describes a set of predetermined undertakings in which a salesperson perform in order to engage and put up with prospective buyer right from the first stage which is pre-approach to a closed sale.

The sale process involves the following steps:

1. Pre-approach

2. Approaching the customer

3. Determining the needs of customers

4. Introducing the product

5. Handling questions and objections

6. Closing the sale

7. Recommendation selling

8. Encouraging and follow up.

Hence, all the steps involved in the sales process deals with CUSTOMER RELATIONS. Therefore, the right answer is option D.

You might be interested in
Maria is starting a pet hotel and needs a website to promote her business and establish her brand. Which of the following is the
german

<em>The answer is </em><em>C. Maria should use turnkey solution that will allow her to use templates and management tools to create a site. </em>

<em> </em>

<em>Turnkey solution</em><em> is a type of business solution that can allow business owners to use these ready-made tools, templates and system to their existing process and business operations. Such tools include </em><em>CRM </em><em>and websites. For example, you are in need of a Loans Management System, that must be implemented next week. You can browse for Loans CRM that are widely available on the internet, subscribe to the service, make payment and this could be used right away in your business operation. Same thing with Maria's needs on the website. She could just subscribe to a website that can allow her to create pages and links with drag and drop and make it running right away.</em>

8 0
3 years ago
What is the result of successfully applying a Machine Learning (ML)<br> algorithm to analyze data?
DIA [1.3K]

Answer:

Machine Learning algorithms can predict patterns based on previous experiences. These algorithms find predictable, repeatable patterns that can be applied to eCommerce, Data Management, and new technologies such as driverless cars..

5 0
3 years ago
Abby is creating a professional development plan to advance in her current career. She has identified what job she wants and wha
Andre45 [30]

Evaluate her current skills and identify areas of improvement

5 0
3 years ago
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
Other questions:
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • What defines a social search?​
    6·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • When should an individual consider entering parenthood?
    5·1 answer
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • What is the difference between a technological problem and a technological opportunity? Explain with an example.
    7·2 answers
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • .When one component modifies an internal data item in anothercomponent we call this:
    7·1 answer
  • May I ask, when you accidently drop your laptop into a pool,...(water) . Will the Data and Many other information... inside the
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!