Answer:
The correct answer is: CRM are often implemented into sales departments first since this area of a company typically generates the greatest amount of customer contact.
Explanation:
To begin with, a Customer Relationship Management or CRM is a management system used in the field of marketing and business in order to create a better relationship with the customers of a company under the creation of a system that uses all of the clients' personal data to achieve the goal of understanding them their likes and dislikes in order to get to known them better and generate a strong bond with them.
To continue, this system is typically used in the sales departments due to the fact that this area of the company is the one<u> that has more contact with the clients</u> at first sight. However, the system could be use in every department of the organization as well.
Basic Input-Output System
<span>This is called an unshielded twisted pair cable, which is also known as a UTP cable. This type of cable has four pairs of wires that are twisted around each other. Because the wires are like this, the electrical interference is reduced.</span>
Answer:
The answer is "Option A and Option B"
Explanation:
This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:
In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.
Answer:
Selective Repeat protocols
Explanation:
It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.
If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.
But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.