1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
2 years ago
11

Shandra recently bought a brand-new digital camera from a local camera shop but when she got it home, she noticed the lens was j

ammed. What would be an effective way for her to handle this situation?
Computers and Technology
1 answer:
Scorpion4ik [409]2 years ago
4 0
Return to the camera shop and bring the camera in. mention that the lens was jammed and she would like a refund. she should stay calm and handle the situation gently, as to not anger the shop keep. if she returns the camera and gets a refund then no harm no foul, no money or product was lost.
hope this helps :)
You might be interested in
You have been instructed to connect a computer to a group of hosts that have been segmented from the regular network. What kind
san4es73 [151]

Answer: VLAN(Virtual local area network)

Explanation: VLAN(Virtual local area network) is the networking device that displays the flexible nature due to the logical connection of one or more LANs. VLAN is used for the purpose of the management, security, scaling etc.

VLAN also has the ability to provide the segmentation in the network by dividing the physical network into segments and making logical network. Router is the source for maintaining the communication in the VLAN.

Thus according to the requirement mentioned in the question ,VLAN is the network device that should be used.

8 0
3 years ago
EIPP:________.
nikdorinn [45]

Answer:

D. All of these choices are correct

Explanation:

Electronic invoice presentment and payment, otherwise known as EIPP are business-to-business systems that combine e-invoicing and e-payment processes for the purpose of sending invoices to customers via Web portal or via a secure network by the use of a third party service provider. They are also used for receiving payer-initiated, third-party-processed, and ACH-network-settled wire transfers.

4 0
4 years ago
Read 2 more answers
The function keys are labeled from f1 to wat
Fed [463]
If we are talking about a simple North American Keyboard, The answer would be F1 to F12
Hope this Helps!!!
8 0
3 years ago
A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
Elodia [21]

Answer:

DOS

Explanation:

Disk operating

4 0
2 years ago
What do HIPAA guidelines protect?
Kruka [31]

Answer:

They protect patient medical records im pretty sure

Explanation:

7 0
3 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • In report design view, you can use commands on the align button of the _____ tab.​
    11·1 answer
  • What is malware short for?
    13·2 answers
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • Who PLAYS Apex Legend?
    10·2 answers
  • Which of the following is not something that consumers need to pay attention to order to make rational choices
    6·2 answers
  • You have a small company and want to keep your costs low, but it is important your employees share data. Which network would pro
    5·2 answers
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • Help its in binary and im a small brain for that
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!