1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
14

What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr

esentative who can then relay them to the customer
Computers and Technology
1 answer:
Misha Larkins [42]3 years ago
6 0

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

You might be interested in
The smallest signed integer number, base 16, that can be store in a variable of type BYTE is__________.
sveta [45]

Answer:

The correct answer is ushort

8 0
4 years ago
AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
Eddi Din [679]

Answer:

HELP ... I WILL GIVE ALL THE POINTS IT CAN.

THE QUESTIONS ARE:

1. ACCORDING TO THE SUBCLASSIFICATION OF EACH WEB SITE AS YOU WOULD DEFINE THE TYPES OF THE WEBSITE.

2. WHAT IS THE DIFFERENCE BETWEEN EACH SUBCLASSIFICATION OF THE WEBSITES

3. LIST EXAMPLES OF EACH SUBDIVISION

THE SUBCLASSIFICATIONS IN QUESTION ARE: SITE BY HEARING, BY DYNAMISM BY OPENING, BY DEPTH AND BY OBJECTIVE

Explanation:

What is the question needed to be answered?

3 0
3 years ago
To get a sense of your digital footprint, you should: Question 2 options: Google yourself regularly, and monitor what your frien
masha68 [24]
Let us examine the given answers.

a) Google yourself regularly, and monitor what your friends post.
  Verdict: This answer is correct, but it is also necessary to look for yourself on other search engines.

b) Google yourself once a year
  Verdict: Once a year is better than doing nothing, but more than once a year is preferable.

c) Google yourself every five years.
  Verdict: The time interval is too long. Your reputation could easily be damaged, or your identity could be stolen in less than 5 years.

d) Delete all your accounts and start fresh.
   Verdict: This will not solve the problem of having your reputation damaged, or having your identity stolen. Information on the web is preserved ins storage vaults for long periods of time.

Answer: 
Google yourself regularly, and monitor what your friends post. Also, search for your name on other search engines.

3 0
4 years ago
cell d1 contains the value 7.877 you want cell d1 to display this value as 7.9 how can you accomplish
Georgia [21]

Answer:

You round?

Explanation:

6 0
4 years ago
Hy plzz help me friends​
timama [110]

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which social networking function came first?
    9·2 answers
  • When computers are connected and operate through one main computer, it is called a _________ network
    14·2 answers
  • Question 7 of 10
    13·1 answer
  • The master production schedule for Product A shows a need for 30 units, and Product B shows a need of 25 units. To manufacture a
    12·1 answer
  • A software EULA is an agreement related to which of the following?
    11·2 answers
  • A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
    10·1 answer
  • This is my paragraph . The type of color is ude in this code line is ..............................
    5·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • Help please answer the question 1 2 3 4 5 6<br><br>help
    12·1 answer
  • What are three major events in computer science history?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!