1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
2 years ago
11

What does SFA software provides tools for

Computers and Technology
2 answers:
pashok25 [27]2 years ago
7 0
Sales force automation<span> </span>software<span> is a program that automates business tasks like inventory control, sales processing, tracking of customer interactions, and analyzing sales forecasts and performance.</span>
solong [7]2 years ago
5 0
They provide tools for sfa spftware
You might be interested in
Given parameters b and h which stand for the base and the height of an isosceles triangle (i.e., a triangle that has two equal s
schepotkina [342]

Answer:

The area of the triangle is calculated as thus:

Area = 0.5 * b * h

To calculate the perimeter of the triangle, the measurement of the slant height has to be derived;

Let s represent the slant height;

Dividing the triangle into 2 gives a right angled triangle;

The slant height, s is calculated using Pythagoras theorem as thus

s = \sqrt{b^2 + h^2}

The perimeter of the triangle is then calculated as thus;

Perimeter = s + s + b

Perimeter = \sqrt{b^2 + h^2} + \sqrt{b^2 + h^2} +b

Perimeter = 2\sqrt{b^2 + h^2} + b

For the volume of the cone,

when the triangle is spin, the base of the triangle forms the diameter of the cone;

Volume = \frac{1}{3} \pi * r^2 * h

Where r = \frac{1}{2} * diameter

So, r = \frac{1}{2}b

So, Volume = \frac{1}{3} \pi * (\frac{b}{2})^2 * h

Base on the above illustrations, the program is as follows;

#include<iostream>

#include<cmath>

using namespace std;

void CalcArea(double b, double h)

{

//Calculate Area

double Area = 0.5 * b * h;

//Print Area

cout<<"Area = "<<Area<<endl;

}

void CalcPerimeter(double b, double h)

{

//Calculate Perimeter

double Perimeter = 2 * sqrt(pow(h,2)+pow((0.5 * b),2)) + b;

//Print Perimeter

cout<<"Perimeter = "<<Perimeter<<endl;

}

void CalcVolume(double b, double h)

{

//Calculate Volume

double Volume = (1.0/3.0) * (22.0/7.0) * pow((0.5 * b),2) * h;

//Print Volume

cout<<"Volume = "<<Volume<<endl;

}

int main()

{

double b, h;

//Prompt User for input

cout<<"Base: ";

cin>>b;

cout<<"Height: ";

cin>>h;

//Call CalcVolume function

CalcVolume(b,h);

//Call CalcArea function

CalcArea(b,h);

//Call CalcPerimeter function

CalcPerimeter(b,h);

 

return 0;

}

3 0
2 years ago
Some of y'all make me lose braincells with your questions
boyakko [2]

Answer:

ok done we will try

BTW have a nice day enjoy your day Stay blessed stay happy stay strong

5 0
2 years ago
Read 2 more answers
_____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify
madam [21]

Answer:

The correct answer to the following question will be "Local mapping".

Explanation:

  • A data independence standard in global DBMSs where questions can be constructed without understanding the local formats. Knowledge of quotas of pieces and components is however important.
  • With the transparency of local mapping, the user wants to determine both fragment location and name of data items, keeping in mind any replication that may occur.
  • This is clearly a more complicated and time-consuming question for all the users to answer than the first. A program that only offers it the amount of transparency would be unlikely to be satisfactory to later part-users.

Therefore, "Local mapping" is the right answer.

6 0
3 years ago
Harry needs to make a presentation on endangered species of animals. Which presentation software elements can he use to display
antiseptic1488 [7]
I Think The answer is either b or d
4 0
2 years ago
What is meant by key distribution center ( KDC)?
erastovalidia [21]

Answer: A. A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon

Explanation: key distribution center ( KDC) is a system that is used to provide access to a particular network user who shares data which are either private or regarded as sensitive.

It is a form of encryption that allows multiple system within the same network through the use of uniquely secured tickets used to setup a secure connection which gives room for data to be shared.

KDC makes use of cryptographic techniques to prove the validity of a user and grants a ticket permission access. The user present the ticket of permission to the system which then validates it and grant access to the user.

Example of security system that adopts KDC include kerberos.

4 0
2 years ago
Other questions:
  • You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using
    15·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • Who is a software engineer
    8·2 answers
  • 1)Which of the following statements about the print statement are TRUE? (Check all that apply)
    8·1 answer
  • I need help fixing this please
    6·2 answers
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • What are general purpose computer and special purpose computer?​
    10·2 answers
  • Moving images of real event​
    12·2 answers
  • In NumPy, the_______
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!