Bentley will likely use the firm's <u>CRM databases</u> to identify these customers.
<u>Explanation</u>:
CRM databases collect information about the customers. It can be used to identify the best customers. The database stores the annual sales report.
CRM is a customer relationship management that manages the interaction between company and customers.
CRM database holds all the data related to the customers like their name, email address, age, Skype address and occupation details.
In the above scenario, Bentley can use CRM database to filter twenty valuable building contractor customers and invite them for golf outing and party.
Answer:
401k
Explanation:
investment plan allow you to invest the most amount of money? ... A Roth 401(k) plan takes money after tax has been removed from gross income, and has a contribution limit, but withdrawal is tax free. A Roth Individual Retirement Account allows you to draw a fixed amount that is not taxed.
Answer:
She should invest $300,000 in Project A, and $200,000 in Project B.
Explanation:
Solution
Since Project B yields a higher return, she should invest as much money as possible in it, which is 40% of the total investment or
or (0.40)($500,000) = $200,000
so
The remaining $500,000 - $200,000 = $300,000 should be invested in Project A.
Therefore, she should invest $300,000 in Project A, and $200,000 in Project B.
Answer:
By practicing simulated cyber attacks. They help in improving the security and firewall of organization thereby enhancing their resistance to cyber infiltration.
Explanation:
Organizations may often intend to evaluate and their degree of vulnerability and test their security standard, hence, they employ the use of a simulated threat pattern whereby the red team act as a threat by using several infiltration techniques usually used by actual infiltrators, the blue team on the other hand acts to repel the advances of the red team by implementing security protocols and architecture capable of neutralizing the simulated attacks of the red team. This way organizations beef up their security in other to forestall actual potential attacks against capable of invading their information and digital systems.