1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
2 years ago
5

When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.

Computers and Technology
1 answer:
laiz [17]2 years ago
4 0

When you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization or company identifies, analyzes, and correct hazards, so as to ensure that normal service operation is restored as quickly as possible to end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

As a support agent, if you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her at a latter time.

Read more on incident management here: brainly.com/question/11595883

You might be interested in
You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
Anna71 [15]

The wireless network is called WAP protocol

8 0
2 years ago
A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, sav
erma4kov [3.2K]

Answer:

system on a chip (SoC)

Explanation:

4 0
2 years ago
Briefly describe the working of computer processing system?
liberstina [14]

Answer:

<em>The Processor</em>

<em>The central processing unit (CPU) guides the computer through the various steps of solving a problem. Data enters the computer through an input unit, is processed by the central processing unit, and is then made available to the user through an output unit.</em>

<em>ExplanationExplanationExplanation:</em>

<em />

5 0
2 years ago
In a relational database, a ____ would ensure that two customers with the same name don’t get confused with each other.
earnstyle [38]

Answer: Primary key

Explanation: Relational databases are those databases which are commonly found in the form of tables . It works in the relation pattern for accessing the data in the database

Primary key is a major factor which is found in the relational databases for the identification of the data in the table's column.It is considered as the unique value that corresponds to the values of rows in the table of relational database.

6 0
3 years ago
With the cold winter months fast approaching, Lungi wants to improve the overall effectiveness of operations at his NGO. He want
igor_vitrenko [27]
There would not be enough blankets
5 0
1 year ago
Other questions:
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Done through Block Py/ Python
    11·1 answer
  • Suddenly, though, just as the procedure was about to be relayed to the astronauts, the pressure . . . the temperature . . . drop
    5·2 answers
  • What is the title of RFC 4890 and what year was this RFC published?
    8·1 answer
  • Write down the bit pattern in the fraction of value 1/3 assuming a floating point format that uses Binary Coded Decimal (base 10
    10·1 answer
  • Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
    9·1 answer
  • Write a recursive function called digit_count() that takes a positive integer as a parameter and returns the number of digits in
    15·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!