1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
14

Write down the appropriate technical term of following statements.​

Computers and Technology
1 answer:
MrRa [10]3 years ago
8 0

Answer:

it is not seeing full. please give full

You might be interested in
Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
Leona [35]

Answer: False

Explanation:Customer relationship management (CRM) is the management system for improving of the business ethics like relationship with customers and interactions etc.Analytical CRM is the analysis system for the customer data.Operational CRM consist of the business process in the front office phase and thus taking care of the customer.

Both the CRM system are considered equal in their operation. Generally, operational CRM helps in contributing to the analytical CRM as the input .So, the statement given is false.

3 0
3 years ago
Which of the following is not true about managing your privacy settings? (select all that apply)
Evgesh-ka [11]
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
4 0
3 years ago
Read 2 more answers
In how many ways can the letters of the word APPROXIMATION be arranged?
ZanzabumX [31]

Answer:

2494800

Explanation:

A lot of math and time.

5 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
In a relational database, the three basic operations used to develop useful sets of data are:
lesya692 [45]
<span>Which is not a component of a database that describes how data is stored?</span>
6 0
3 years ago
Other questions:
  • Peter wants to submit his admission form online. What type of input element will allow him to enter his last name on the web pag
    6·1 answer
  • This is important I need help please
    14·1 answer
  • The process of combining rows and columns in a table is called _____.
    8·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • Someone please tell me please y my ps4 controller won’t charge:(
    12·2 answers
  • Which 2 processes are operational processes
    10·1 answer
  • 11 Select the correct answer. Which external element groups items in a design?
    9·1 answer
  • What is my mistake on this code? (Python)
    9·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!