1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
14

What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr

esentative who can then relay them to the customer
Computers and Technology
1 answer:
Misha Larkins [42]3 years ago
6 0

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

You might be interested in
What is the best operating system
True [87]
#1 Windows
#2 Ubuntu
#3 Mac OS
#4 Fedora
#5 Solaris

Those are the top 5 best operating systems
6 0
3 years ago
Project light with a system of lenses used for projecting slides or film into a screen.
Travka [436]

Answer:

Optical system. An overhead projector works on the same principle as a slide projector, in which a focusing lens projects light from an illuminated slide onto a projection screen where a real image is formed.

Explanation:

7 0
2 years ago
A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
rewona [7]

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

8 0
3 years ago
I have no idea which one please help!
shutvik [7]

Answer:

i think its the second one

Explanation:

brainliest pls

6 0
2 years ago
Read 2 more answers
What lets you do many things, like write book reports and stories?
Marina CMI [18]
A -
Application programs
8 0
2 years ago
Read 2 more answers
Other questions:
  • A customer in a store is purchasing 5 items. Write a python program that asks for the price of each item and display the subtota
    14·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Identify the type of error described
    6·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • A list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor.
    14·1 answer
  • How would you delete a slide from your presentation after selecting it?
    14·1 answer
  • What does a theme contain?
    14·2 answers
  • The _________________ creates international guiding principles for computer forensic examiners.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!