Answer:
User characteristics
Explanation:
a prospect calls a sales rep at a firm as teh prospect listend to her pitch he keeps pushing back that the price is higher than most. What should the rep do?
Since there is a prospect calls a sales rep at a firm as the prospect listened to her pitch he keeps pushing back that the price is higher than most. the thing that the rep can do is option d: Ask him to set aside price for now to see if the services are a good fit.
How to be a sales repA sales rep is known to be any body that is a person who is said to function as the seller of products or services for a given firm.
Note that they are often in seen in a specific field or area. Rep is a wood that is the short form for representative. The term sales representative are people who often works for (stand) for a company but the salesperson is one that can also be selling their own special products.
There are different kinds of calls and there are ways to handle such calls. Based on the scenario above, Since there is a prospect calls a sales rep at a firm as the prospect listened to her pitch he keeps pushing back that the price is higher than most. the thing that the rep can do is option d: Ask him to set aside price for now to see if the services are a good fit.
Learn more about sales rep from
https://brainly.com/question/28410390
#SPJ1
A prospect calls a sales rep at a consulting firm. As the prospect listens to her sales pitch, he keeps pushing back that the price is higher than most. What should the rep do? a. Agree that her company's services are expensive but promise that they'll solve his problems b. Ask him to hold and check with her supervisor if she can offer a discount a c. Ask him what price he would consider fair and reasonable d. Ask him to set aside price for now to see if the services are a good fit e. Point out that if he did his research, he knows that her company's services are better than those of competitors
What is the memory size, in bytes, of a float? (Note: 1byte = 8bits)
Answer: 4 bytes
Explanation: if doubled be 8 bytes
Help please♀️
What is the name for the different RULES that are specific to each programming
language? These languages use commands and logic statements to make the
computer accomplish its intended purpose.
Software
Programs
Syntax
Binary
Answer:
syntax
Explanation:
Each programming language follows a specific set of “grammar” rules called syntax; Every programming language is designed to serve a specific purpose, i.e. to allow you to build websites, do data analysis, or create desktop software etc.
Im in 7th grade :D
In this lab, you add a loop and the statements that make up the loop body to a C++ program that is provided. When completed, the program should calculate two totals: the number of left-handed people and the number of right-handed people in your class. Your loop should execute until the user enters the character X instead of L for left-handed or R for right-handed.
The inputs for this program are as follows: R, R, R, L, L, L, R, L, R, R, L, X
Variables have been declared for you, and the input and output statements have been written.
Instructions
Ensure the source code file named LeftOrRight.cpp is open in the code editor.
Write a loop and a loop body that allows you to calculate a total of left-handed and right-handed people in your class.
Execute the program by clicking the Run button and using the data listed above and verify that the output is correct.
// LeftOrRight.cpp - This program calculates the total number of left-handed and right-handed
// students in a class.
// Input: L for left-handed; R for right handed; X to quit.
// Output: Prints the number of left-handed students and the number of right-handed students.
#include
#include
using namespace std;
int main()
{
string leftOrRight = ""; // L or R for one student.
int rightTotal = 0; // Number of right-handed students.
int leftTotal = 0; // Number of left-handed students.
// This is the work done in the housekeeping() function
cout << "Enter an L if you are left-handed, a R if you are right-handed or X to quit: ";
cin >> leftOrRight;
// This is the work done in the detailLoop() function
// Write your loop here.
// This is the work done in the endOfJob() function
// Output number of left or right-handed students.
cout << "Number of left-handed students: " << leftTotal << endl;
cout << "Number of right-handed students: " << rightTotal << endl;
return 0;
}
A loop and the statements that make up the loop body to a C++ program that is provided. When completed, the program should calculate two totals: the number of left-handed people and the number of right-handed people in your class. Your loop should execute until the user enters the character X instead of L for left-handed or R for right-handed.
The Program#include <iostream>
#include <string>
// R, R, R, L, L, L, R, L, R, R, L, X ==> 6R 5L X
void getLeftOrRight(std::string &l_or_r, int &total_l, int &total_r) {
// notice how the above line matches: getLeftOrRight(leftOrRight, leftTotal, rightTotal);
// the values provided from the loop are given nicknames for this function getLeftOrRight()
if (l_or_r == "L") { // left-handed
total_l++;
} else if (l_or_r == "R") { // right-handed
total_r++;
} else { // quit
// option must be "X" (quit), so we do nothing!
}
return; // we return nothing, which is why the function is void
}
int main() {
std::string leftOrRight = ""; // L or R for one student.
int rightTotal = 0; // Number of right-handed students.
int leftTotal = 0; // Number of left-handed students.
while (leftOrRight != "X") { // whilst the user hasn't chosen "X" to quit
std::cout << "Pick an option:" << std::endl;
std::cout << "\t[L] left-handed\n\t[R] right-handed\n\t[X] quit\n\t--> ";
std::cin >> leftOrRight; // store the user's option in the variable
getLeftOrRight(leftOrRight, leftTotal, rightTotal); // call a function, and provide it the 3 arguments
}
std::cout << "Number of left-handed students: " << leftTotal << std::endl;
std::cout << "Number of right-handed students: " << rightTotal << std::endl;
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
What was the largest processor used in the 1990s?
(1 point)
O 16-bit
O 32-bit
O 64-bit
O 128-bit
Answer: 64 bit
Explanation: 128 bit not used at that time
Classify the following devices as input or ourput. Draw a line from the picture to the correct name of the device.
Answer:
input: keyboard + mouse
output: monitor + printer
What can a programmer expect when writing a modular program for a game
Answer:
That it's gonna be hard.
HELP ME OUT PLEASE!!!!!!!
________ this design element is used to indicate hierarchy.
A) Line
B) Decorative
C) Shade
D) Balance
Answer:
Line
Explanation:
Because they have a big line thanks for the points please help me with my problem is in my profile
Answer:
Line
Explanation: Because they have a big line thanks for the points please help me with my problem is in my profile
which of these indicators could be represented by a single ?
Answer:
The charge level of the battery (0-100%)
Explanation:
which Preview in Lightroom allows you to edit images that are not physically connected to your computer
The Preview in Lightroom allows you to edit images that are not physically connected to your computer is Smart Preview.
What is Lightroom?Lightroom assists you with importing, organizing, managing, and finding photographs. Lightroom, on the other hand, combines picture management and photo editing into a single product. Lightroom is a non-destructive picture editor.
Lightroom Classic's Smart Previews feature allows you to edit photographs that are not physically linked to your computer. Based on the lossy DNG file format, Smart Preview files are a lightweight, smaller file format.
Hence, the Preview in Lightroom allows you to edit images that are not physically connected to your computer is Smart Preview.
Learn more about LightRoom here:
https://brainly.com/question/14509650
#SPJ1
(7) Accept a 4-digit number from a user. Your task is to create a simple encrypted corresponding value
of this number. First separate each number into its individual digits. For each individual digit, if the
individual digit is greater than or equal to 5, subtract that value from 9. Output the new value (in its
individual digits) which would now represent the encrypted corresponding value. For example, if the
user entered 5678, the encrypted corresponding value would be 4 2 3 1. (Required: IPO chart,
Pseudocode, C-program and Python)
Using the knowledge in computational language in python it is possible to write a code that create a simple encrypted corresponding value
of this number.
Writting in the C code:#include<stdio.h>
int main()
{
int num,r,rev=0;
scanf("%d",&num);
while(num!=0)
{
r=num%10;
rev=rev*10+r;
num=num/10;
}
while(rev!=0)
{
r=rev%10;
if(r>=5)
{
r=9-r;
}
printf("%d ",r);
rev=rev/10;
}
return 0;
}
Writting in python code:num=int(input("Enter number:"))
rev=int(str(num)[::-1])
while rev!=0:
r=rev%10
if r>=5:
r=9-r
print(r,end=" ")
rev=rev//10
See more about python at brainly.com/question/12975450
#SPJ1
Which of the following is an operating system? Dell MacBook air or windows 10
Answer:
Windows 10
Explanation:
Dell & Mac Book Air are brands.
Choose the type of malware that best matches each description.
to be triggered
:infects a computer or system, and then replicates itself, but acts independently and does not need
: tricks the user into allowing access to the system or computer, by posing as a different type of file
infects a computer or system, and then replicates itself after being triggered by the host
Answer:
B - tricks the user into allowing access to the system or computer, by posing as a different type of file
Answer:
Worm: infects a computer or system, and then replicates itself, but acts independently and does not need to be triggered
Trojan horse: tricks the user into allowing access to the system or computer, by posing as a different type of file
Virus: infects a computer or system, and then replicates itself after being triggered by the host
Explanation:
Difference between us 2.0
and 3.0 flash drive
USB 2.0 offers a transfer rate of about 480 Mbps, whereas USB 3.0 offers a transfer rate of about 4,800 Mbps
Which roles Primary responsibility is the handling of the physical media
The physical layer is in charge of transmitting computer bits from one device to another across the network.
What is physical media?Physical media are the physical materials used to store or transmit data in data communications.
These physical media are typically physical objects made of metals or glass. They have physical properties such as weight and color and can be touched and felt.
Unguided Media or Unbounded Transmission Media are other terms for wireless communication. There is no physical medium required for the transmission of electromagnetic signals in this mode.
The physical layer is in charge of sending computer bits across the network from one device to another.
Thus, this is the role that Primary responsibility is the handling of the physical media.
For more details regarding physical media, visit:
https://brainly.com/question/5045828
#SPJ1
Describe the differences between power and authority
Answer:
power is authjority
Explanation:
Which of the following statements is false? A JavaScript identifier
- is case-sensitive
- can start with a $ sign
- can start with a number
- can be more than 128 characters long
Answer:
case sensitive, assuming iddentifier here means a variable.
Which of the following protects intellectual property?
A. copyright
B. trademark
C. putting on a play
D. writing a novel
Answer:
A). Copyright
the next questions answer is
C). For the life of the author plus seventy years.
Explanation:
I just did the Assignment on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
explain why it is important for you to understand and explain the basic internal and external parts of a computer in the work place setting
Answer:
Having a good understanding of the terminology and jargon used with computers helps you be more efficient with other technology.
Explanation:
Anyone connected to the Internet has a better understanding of using the Internet and connecting other devices.
Where do you search to identify the user who last modified a shared document in Word 2019?
O in the Data tab
O in the Help view
O in the Review tab
O in the Backstage view
The option where you search to identify the user who last modified a shared document in Word 2019 is option c: in the Review tab.
How can you tell when a Word document was last modified?In Word, a person can be able to the document properties if only they click the File tab and then select Info to display the properties for an open document in Word.
Note that the document's properties are listed on the right side of the window, including the Last Modified date, the creation date, and others.
Hence, the Review Tab's functions include document proofreading and giving you the option to get input on your final revisions.
Therefore, based on the above, The option where you search to identify the user who last modified a shared document in Word 2019 is option c: in the Review tab.
Learn more about Word document from
https://brainly.com/question/1596648
#SPJ1
Answer: Its The Backstage view.. right on EDGE
Explanation:
Select the two correct statements about Cloud Logging.
Cloud Logging lets you define uptime checks.
Cloud Logging lets you define metrics based on your logs.
Cloud Logging requires the use of a third-party monitoring agent.
Cloud Logging requires you to store your logs in BigQuery or Cloud Storage.
Cloud Logging lets you view logs from your applications and filter and search on them.
The two correct statements about Cloud Logging include the following:
Cloud Logging lets you define metrics based on your logs.Cloud Logging lets you view logs from your applications and filter and search on them.What is cloud computing?Cloud computing can be defined as a type of computing that requires the use of shared computing resources over the Internet rather than the use of local servers and hard drives.
What is Cloud Logging?Cloud Logging can be defined as a fully managed service that is designed and developed to avail end users an ability to store, search, analyze, monitor, and receive notifications on logging data and events from Cloud services providers.
In this context, we can reasonably infer and logically deduce that Cloud Logging allows an end user to define metrics based on his or her logs.
Read more on Cloud storage here: https://brainly.com/question/18709099
#SPJ1
State two input devices and two output devices, explaining how they would be useful in graphic design work.
Answer:
input: keyboard, mouse
output: monitor, printer
Explanation:
keyboard: to type out any words needed on designs
mouse: to be able to click/draw
monitor: to see the work you've done
printer: to print any physical designs to send to client or to use as samples
Write JavaScript code to convert the number 236.2363611111556 into currency format
and JavaScript statement to show output.
please someone help me, I am asking this for second time.
The JavaScript code to convert the number 236.2363611111556 into currency format and show output is given below:
The JavaScript Codefunction financial(x) {
return Number.parseFloat(x).toFixed(2);
}
This code helps to convert the given number: 236.2363611111556 into currency format..
The code defines a method and function which is x, then uses curly brackets to tell the compiler that a new command is being sent.
Then an already declared variable, Number would be parsed to another variable using float so it could contain decimal numbers.
At the end, the given number: 236.2363611111556 would be converted into currency format..
Read more about javascript here:
https://brainly.com/question/16698901
#SPJ1
What devices do you or people you know use that may have an accelerometer or compass to perform certain tasks or functions
Answer: your smart phone and even tablet
making smart communication system is main application of?
Answer:
Typical communications applications include wireless systems using RF and microwave, MIMO, wireless LAN's, mobile phones, base station monitoring, surveillance, satellite communications, bus testing, cable testing, antenna and transmitter testing.
A designer wants to design for the smallest and most basic version of their site, like for a mobile phone. What approach should they use? (UX)
Dedicated desktop web design
Graceful degradation
Progressive enhancement
Dedicated mobile app design
Answer:
Progressive enhancement
OR
Dedicated mobile app design
Most likely Dedicated mobile app design
why is this happening and how do I fix it?
Answer:
who is known as prophet of the computer?why?
MC Qu. 05 The most common way to access the Internet i...
The most common way to access the Internet is through
Write the web HTML code for inserting an image into a web run output in case the suggested image is not available
Answer:
[tex]{ \tt{ < img \: { \blue{src ={ \orange{"www.image.com" \: { \green{alt = " \: "}}}} }}}/ > }[/tex]
That's the code
Is Qatar a highly restricted internet censored country? What is the best free VPN for Qatar?
Answer: Yes.
Explanation:
Qatar is a highly restricted country in terms of the internet freedom. It keeps blocking different websites that may go against its culture. In
Qatar is a highly restricted country in terms of the internet freedom. It keeps blocking different websites that may go against its culture.
You may look for the best free security tool for Qatar. But, it will not work best. You must try the paid, best security tool for Qatar that is reliable and highly secured. CovermeVPN the best security tool for Qatar.