Answer:
Option c and e
Explanation:
In simple words, Proper telephone etiquette becomes vital to business success as it is typically a consumer's initial point of contact so that reflects how your management will handle them in those other communications. Ensure sure any consumer that calls your company gets a perfect, lasting experience.
Thus, one should talk to the client politely and be professional during the talks as it makes a positive impact of personality on the client.
When builders were constructing a sidewalk they forgot to include an expansion joint between two of the segments, L= one.two m at to=twenty degree C.
Expect the reverse ends of each segment are fixed and the linear enlargement coefficient is = twelve.three x ten-six degree C-one.
Answer: Jackson would decrease CASH and increase EXPENSES in the accounting equation.
Explanation: Jackson would lose cash by spending his money and his Living expenses will also rise along with it.
The value that would be assigned to this house if you decide to use it as your office would be $ 425300
<h3>How to solve for the value of the house using opportunity cost</h3>
To get the value of the house, you have to get the opportunity cost of the house. This is the foregone alternative or benefits forgone due to another choice.
The formula is opportunity cost = Apprised Value - Selling costs
The apprised value = $439,500.
selling cost = $14,200
$439,500 - $14,200
= $ 425300
Hence the value that should be assigned to it is $ 425300
Read more on opportunity cost here:
brainly.com/question/1549591
#SPJ4
Answer:
C. hacking
Explanation:
Hacking is a term used to describe an unauthorized access to a computer data base for illegal purposes. It also means breaking into an organization's security data system either to corrupt data, steal information or disrupt certain activities.
Most hackers demand for monetary returns or cause collateral damage having gained unathourized access into an organization's data base.
There are several ways of hacking which includes;
Phising scam: An attempt to have access into a computer by making a user open an attachment or provide confidential information.
Malware attack: is a type of hacking attack which after being carried out, cripple activities of an entire organization including its business associate, government parastatals, customers etc in exchange for money.
Code break: This is where a secret software is installed to allow users hit a company' s data base through strings.
Organizations are beginning to expend money on their security systems by constantly updating them against any internal and external attack.