1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
15

Which of the following is an example of a consumer service? computer builder motorcycle manufacturer cabinet maker air condition

er repair
Computers and Technology
2 answers:
Zanzabum3 years ago
6 0
Motorcylce manufacturer
Kazeer [188]3 years ago
4 0

Answer:

air conditioner repair

Explanation:

    When we purchase a product or hire a service that presents a problem, or even when we want to request cancellation or return, it is natural to seek telephone contact through a company's Customer Service for guidance and assistance. Possible disruptions include improper part functioning, manufacturing defects, misleading information, poor service, and so on.

You might be interested in
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
3 years ago
What can I do If my Texas Instrument TI-84 calculator is not giving accurate answers?
zlopas [31]

Answer:

replace the batteries possibly

Explanation:

4 0
2 years ago
Standards for all managers ethical responsibilities are covered in a company's
attashe74 [19]
C. Code of ethics is correct.
4 0
3 years ago
Read 2 more answers
For off campus work study positions, students should contact the
anygoal [31]

Answer:

The answer is "financial aid office".

Explanation:

The work studies are a good way for people to raise funds in component-time on-campus jobs for payment for tuition. In off-campus study, it uses financial aid office, that provides learners to chance to gain useful job experiences when they study at university.

  • It usually works with you even if you have received an admission invitation.
  • In off-campus study work, it uses the department of Financial Aid, in which it is used to find the financial aid office of your school.
  • It can scan the sorted alphabetically lists below.
7 0
3 years ago
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • What must be done if the intended destination hardware is not supported by the chosen OS?
    6·1 answer
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • Elizabeth works for a local restaurant At the end of her shift, she is required
    15·2 answers
  • Reasons for the growth of decision-making systems include:
    13·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • Which is a linear presentation?
    10·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!