1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
2 years ago
9

Identify and describe the kind of trouble ticket system you would recommend in the following scenario hey small marketing firm d

oes not anticipate much growth over the next 10 years in addition the company anticipate a steady stream of trouble tickets without any peaks
Computers and Technology
1 answer:
yarga [219]2 years ago
8 0

Answer:

There is no hesitation at all that the company is going through recession, and will for next 10 years. Hence, we need to be crystal clear with our budget for this company, and provide low cost solutions. The company requires trouble ticket system. The simplest can be a back-end service to store trouble ticket details, and with API like ticket check, cancellation on fraud and many such. However, the company can select the most important from this list as well, and leave the remaining, as software company is going to charge for this.  Also. we can build a simple app for the company with APIs that we developed with good design, and we can make use of web socket programming to ensure client server communication, and data transfer. We can make use of the chatbots as well, and that is the cheapest definitely currently.

Explanation:

The answer is self explanatory.

You might be interested in
Assume n represents the number of inputs. The possible number of states within a truth table can be calculated using which of th
yarga [219]

Answer:

That would be Number 2 :)

Explanation:

5 0
3 years ago
Management information system by different outhors<br>​
morpeh [17]

Answer:

Explanation:

.....

...,....

8 0
2 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe p
Diano4ka-milaya [45]

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

7 0
3 years ago
"Save" or "save as" can be used interchangeably and have no unique features.<br> True<br> False
zimovet [89]

Answer:

False.

Explanation:

"save" just preserves any edits made to file in its current state. "Save As" lets you rename it and change the file type.

4 0
2 years ago
Read 2 more answers
Other questions:
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • I need help!
    14·1 answer
  • Modify class Time2 of fig 8.5, (which is split into four pictures) to include a tick method that increments the time stored in a
    8·1 answer
  • Please help if you answer correcly i will give you brainelst!!!!!!!!!!!!!!!!!!
    6·2 answers
  • Difference between private and confidential data?​
    5·1 answer
  • Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name
    12·1 answer
  • Uh can somebody help me
    6·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!