Assume that you are the owner of a small bicycle sales and repair shop serving hundreds of customers in your area. Identify the kinds of customer information you would like your firm's Customer Relationship Management (CRM) system to capture. How migh
this information be used to provide better service or increase revenue? Identify where or how you might capture this data.

Answers

Answer 1

Answer:

Bicycle shops specialize in the selling of bicycles. Depending on the shop, they may also buy, special order, rent, or repair bicycles as additional services. The retail space of the shop usually dictates the size of the inventory.

CRM-Customer Relationship Management:

The CRM is the process of integrating the functions of sales of the product, marketing, and services provided in an organization.

The objective of CRM is to help sales associates to plan the relationship development activities required to maintain and expand business.


Related Questions

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications in order to become a

Answers

Answer: Digital Communications Specialist

Explanation:

Took The Test Myself

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications, in order to become a: Digital Communications Specialist.

What is a bachelor's degree?

A bachelor's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her high school, and it usually takes about 4 or 5 years to complete a bachelor's degree.

What is a master's degree?

A master's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her bachelor's degree programme.

In conclusion, students are required to earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree in digital communications, in order to become a Digital Communications Specialist.

Read more on Digital Communications Specialist here: https://brainly.com/question/27746922

#SPJ1

Which property is used to identify the origin of an igneous rock ?

Answers

it should be crystal size
Crystal Size

Explanation:

What's the biggest challengeWeb analytics can tell you many things about your online performance, but what can analytics tools not tell you?

A
What your customers are doing on your website
B
Where your customers have come from before visiting your website
C
Where your customers go after leaving your website
D
What your customers are looking for on your website for most businesses when going online?

Answers

Answer:

(C) Where your customers go after leaving your website

Which of the following is a reasonable capacity for a modern thumb drive? 10MB, 80Mb, 128GB, 8000Tb. Do an Internet search and think carefully about what these values mean. To get any credit you must provide a reason for your answer.

Answers

Answer:The reasonable capacity for a modern thumb drive is 128 GB.

Explanation:

(Geometry: area of a triangle)
Write a C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area.
The formula for computing the area of a triangle is:
s = (side1 + side2 + side3) / 2
area = square root of s(s - side1)(s - side2)(s - side3)

Sample Run:
Enter three points for a triangle: 1.5 -3.4 4.6 5 9.5 -3.4
The area of the triangle is 33.6

Answers

A C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area is given below:

The C++ Code

//include headers

#include <bits/stdc++.h>

using namespace std;

//main function

int main() {

//variables to store coordinates

float x1,x2,y1,y2,x3,y3;

cout<<"Please Enter the coordinate of first point (x1,y1): ";

// reading coordinate of first point

cin>>x1>>y1;

cout<<"Please Enter the coordinate of second point (x2,y2): ";

// reading coordinate of second point

cin>>x2>>y2;

cout<<"Please Enter the coordinate of third point (x3,y3): ";

// reading coordinate of third point

cin>>x3>>y3;

//calculating area of the triangle

float area=abs((x1*(y2-y3)+x2*(y3-y1)+x3*(y1-y2))/2);

cout<<"area of the triangle:"<<area<<endl;

return 0;

}

Read more about C++ program here:

https://brainly.com/question/20339175
#SPJ1

Question 6 of 20:
Select the best answer for the question.
6. Harassment is a/an
O A. single
O B. repeated
O C. unsuccessful
O D. successful
attempt to harm a person.

Answers

Harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

What is Harassment?

Harassment may be defined as derogatory actions or words that may significantly have a disrespectful nature with the intention to harm the feelings, emotions, and behaviors of others.

According to the question, harassment is not a single attempt, it may force numerous times in order to affect the native feelings and emotions of others. But the ultimate effect of this depends on personal understanding and dedication. If an individual is well-determined, the attempt made is unsuccessful.

Therefore, harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

To learn more about Harassment, refer to the link:

https://brainly.com/question/12830365

#SPJ1

How many bits is needed to distinctly address 226KB in a byte addressable Memory?

Answers

To distinctly address 226kb in a byte addressable memory, one would need 8 bits.

What is an addressable memory?

Word addressing in computer architecture implies that addresses of memory on a computer authenticate words of memory.

In contrast to byte addressing, where addresses authenticate bytes, it is commonly employed.

What is the calculation justifying the above answer?

Given:

2⁸ = 256

and 226 < 256

Hence, we need 8 bit.

Learn more about addressable memory:
https://brainly.com/question/19635226
#SPJ1

A(n) _______ _______ is a collective term for all the ways you interact with a software program.

Answers

Answer:

The user interface is a collective term for all the ways you interact with a software program. You can interact with a software program using a keyboard, a mouse, a touch screen, or a voice-activated assistant.

Explanation:

Hope this helps!

Design a pseudo code that determines if a given number is even or odd number

Answers

0. Start
1. Print "Enter Any Number to Check, Even or Odd"
2. Read input of a number
3. If number mod = 0
4. Print "Number is Even"
5. Else
6. Print "Number is Odd"
7. End

The pseudocode determines if a given number is even or odd by checking if it's divisible by 2 and then prints the respective result.

Here's a simple pseudocode to determine if a given number is even or odd:

Input: number

Output: "Even" if the number is even, "Odd" if the number is odd

if number is divisible by 2 with no remainder then

   Print "Even"

else

   Print "Odd"

end if

This pseudocode checks whether the given number is divisible by 2. If it is, it prints "Even" since even numbers are divisible by 2. Otherwise, it prints "Odd" since odd numbers are not divisible by 2.

Learn more about pseudocode here:

https://brainly.com/question/17102236

#SPJ7

# Your task is to modify the previous examples code to
# print out all the even numbers from 1 to N where N is
# an int from the user

Answers

Answer:

n = int(input('N: '))

for i in range(1, n + 1):

   if i % 2 == 0:

       print(i)

Write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator). Your program should then divide the numerator by the denominator. Lastly, your program will add the quotient and the remainder together.

Answers

function divide(num, den, rem) { //Numerator, Denomenator, Remainder

 rem = Math.abs(num) % Math.abs(den)

 return rem

}

console.log(divide(13, 5)) // logs '3'

Math.abs() is a function to make the integer a positive integer so that negative integers cant be divided

'rem' gets the remainder

What is the difference between a reserved word and a user-defined identifier?

Answers

The difference between a reserved word and a user-defined identifier is that A reserved word is known to be the keyword that is often used in programming language that act  as the mark to a structure of a statement while the standard identifier is known to be the keyword that tells or defines a given type.

What is the difference between reserved words and user defined words?

Some use the word such as"keyword" and "reserved word" are known to be used a lot interchangeably, but  others differentiate its usage, by the use of "keyword" to connote a word that is unique if only in some certain cases but "reserved word" to connote  a unique word that cannot be used as a type of user-defined name.

Therefore, The difference between a reserved word and a user-defined identifier is that A reserved word is known to be the keyword that is often used in programming language that act  as the mark to a structure of a statement while the standard identifier is known to be the keyword that tells or defines a given type.

Learn more about reserved word from

https://brainly.com/question/17382861

#SPJ1

When a copyright for work has expired the work is then said to be in the

Answers

Answer:

Public Domain

Explanation:

Came to me in a dream

Answer:

Public Domain. This means that the work is no longer under copyright protection and can be used by anyone.

Explanation:

Hope this helps!

Explain the significance of Liteware in modern application development

Answers

Answer:

A set of rules which is made on the basis a number of observations done by user is called the principles of software development.j

The significance of Lite ware in modern application development is known to be important because it is said to be a group  of software applications or utility that is aid to be freely available to an end customers but has little capability when compared to full, paid version.

What does Liteware Mean?

Liteware is known to be a kind of software utility that has a more lowered form of functionality than when compared to a full as well as a paid version.

It is one that is said to be  freely distributed to end users and it also gives room for a lot of software developers as well as independent software vendors (ISV) to be able to make use of the lite version at no cost prior to their purchasing of the real software.

Therefore, The significance of Lite ware in modern application development is known to be important because it is said to be a group  of software applications or utility that is aid to be freely available to an end customers but has little capability when compared to full, paid version.

Learn more about modern application from

https://brainly.com/question/24518752

#SPJ1

If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

If the site tells you what your password was, that means the site is storing your password rather than just a hash of it. This means that anyone who gains access to the site’s password database has access to all the passwords. If the site sends you a temporary password, there is a good chance it is not storing actual passwords, which is the correct approach from a security perspective.

Answers

I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Why the above idea?

If a person is said to click forgot password button on a site, the  email that is said to have their old password will be sent a new Passwords from the website in question.

But this is one that is not often secure based on the fact that the system admins and programmers  will be seeing the  password.

On the  other hand, let say  the site sends a new password without carrying out any kind of proper validation and whoever that has asked  for the new password, the new password may fall into the hands of those who it is being sent to and this may be an intruder therefore, it is one that is also risking website owners and users as well.

Hence, I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Learn more about System hack from

https://brainly.com/question/23294592
#SPJ1

Which of the following is an example of universal app?


a) taskbar
b) weather
c) snap

Answers

Please specify. An universal app is b) weather.

Write a program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Use a Scanner object to read in a double value for the monetary amount
Convert the total monetary amount to an integer representing the total number of cents (there are 100 cents in a dollar)
US monetary denominations
ten dollar bill = 1000 cents
five dollar bill = 500 cents
one dollar bill = 100 cents
quarter coin = 25 cents
dime coin = 10 cents
nickel coin = 5 cents
penny coin = 1 cent
Use integer division (/) and modulus (%) to calculate each denomination and the cents left over
Hint: You will need to successively divide the remaining cents by the number of cents in the denomination, starting with the ten dollar bills.
tens = remainingCents / 1000; // Divide the total cents by the number of cents in $10
remainingCents = remainingCents % 1000; //Remainder of division by 1000 is what is left after $10 bills taken out
When user input appears as shown in Figure 1, your program should produce output as shown in Figure 2.

Figure 1: (input)

37.84
Figure 2: (output)

$37.84 is equivalent to the following:
3 ten dollar bills
1 five dollar bills
2 one dollar bills
3 quarters
0 dimes
1 nickels
4 pennies


import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge of computational language in python we can write the code as program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Writting the code:

import java.util.Scanner;

public class Money {

public static void main(String[] args) {

double amount; // This displays user's amount

int one, five, ten;

int penny, nickel, dime, quarter;

// Create a Scanner object to read input.

Scanner kb = new Scanner(System.in);

// Get the user's amount

System.out.print("What is the amount? ");

amount = kb.nextDouble();

// Calculations

ten = (int) (amount / 10);

amount = amount % 10;

five = (int) (amount / 5);

amount = amount % 5;

one = (int) (amount / 1);

amount = amount % 1;

quarter = (int) (amount / .25);

amount = amount % .25;

dime = (int) (amount / .10);

amount = amount % .10;

nickel = (int) (amount / .05);

amount = amount % .05;

penny = (int) (amount / .01);

amount = amount % .01;

// Display the results

//println adds a new line by default

System.out.println(ten + " tens.");

System.out.println(five + " fives.");

System.out.println(one + " ones.");

System.out.println(quarter + " quarters.");

System.out.println(dime + " dimes.");

System.out.println(nickel + " nickels.");

System.out.println(penny + " pennies.");

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Cleo is working in Excel and encounters a word that she would like Excel to ignore permanently for all workbooks. Which of the following options should she select?

Ignore Once
Ignore All
Add to Dictionary
AutoCorrect

ANSWER IS C Add to Dictionary

Answers

Answer:

ignore all

Explanation:

The answer is ignore all not add to dictionary

Answer:

C

Explanation:

its C dont listen to anyone else i got you

Now let's build a calorie counter. The NHS recommends that
an adult male takes on board 2,500 calories per-day and an
adult woman takes on 2,000 calories per-day. Build your
program in python for a woman or a man.

Answers

The building of a program in python for a calorie intake per day by a woman or a man is represented as follows:

print("Your calorie counter")

calories = int(input("How many calories have you eaten today? "))

s=2000-calories

print("You can eat", s, "calories today")

What is Python programming?

Python programming may be characterized as a kind of high-level computer programming language that is often utilized in order to construct websites and software, automate tasks, and conduct data analysis.

There are various factors and characteristics of python programming. Each program is built based on specific attributes. They are strings (text), numbers (for integers), lists (flexible sequences), tuples, and dictionaries. The most important components are expression, statements, comments, conclusion, etc.

Therefore, the python programming for a calorie intake per day by a woman or a man is mentioned above.

To learn more about Python programming, refer to the link:

https://brainly.com/question/26497128

#SPJ1

Question 6 of 10 What are three reasons teachers might choose to use Zoom to teach and communicate with students remotely? A. It is easy for teachers to see when students indicate they have a question. B. It has a screen-share feature that allows teachers to share their screen and whiteboard. C. It has a waiting room that allows teachers to send their students to a time-out area for misbehavior. D. It includes the ability to display the video feeds of all students in a session.​

Answers

Answer:

D

Explanation:

so the teacher can see everything they do and would not need to text their parents and moody of them are at home

What is it called when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness?
A) Stranded energy
B) Explosive energy
C) Lost energy
D) Entrapped energy

Answers

B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.

Is the energy stored when released may cause serious accidents or physical damage?

Stored energy are known to be any form of mechanical, gravitational, hydraulic that is known to be  energy stored in machines as well as in  equipment.

Stored energy hazards if released accidentally can cause serious injury.

Therefore, B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.

Learn more about energy from

https://brainly.com/question/13881533

#SPJ1

Two examples of a relation and their candidate key.

Answers

The two examples of relation and their candidate key are as follows:

STUD_NO in STUDENT relation.FAMIL_EARN in ECoNOMIC relation.

What is the Candidate key?

The candidate key may be defined as a particular kind of field in a relational database that can significantly recognize each unique record independently of any other data.

The candidate key remarkably illustrates the minimal set of ascribes that can uniquely identify given characteristics of the data. More than one candidate key takes place to represent a given set of data and information on the basis of some attributes.

Therefore, the two examples of relation and their candidate key are well described above.

To learn more about Candidate key, refer to the link:

https://brainly.com/question/13437797

#SPJ1

What is the difference between the output of these two statements?


print("email")
print(email)

A: One statement prints the word "email" in quotes, the other prints the word email without quotes

B: One statement prints the word email, the other prints the value of a variable named email

C: One statement prints out the word email, the other gets input and stores it in a variable named email

D: There is no difference, both statements print the word email

Answers

Answer:

B: One statement prints the word email, the other prints the value of a variable named email

Explanation:

This is because if you add quotation marks, it will be counted as a text output.

If there are no quotes, it would assume that it is a variable.

why computer is now considered a commodity.

Answers

Answer:

Computers are considered commodities because they are relatively easy to produce and there is a lot of competition in the market. This means that prices are relatively low and there is not a lot of differentiation between products.

Explanation:

Hope this helps!

import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer

Writting the code:

import java.util.*;

public class ChangeTendered {

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the purchase price: ");

       double price = scan.nextDouble();

       System.out.println("Enter the amount payed: ");

       double ammountPayed = scan.nextDouble();

       double changeDue = ammountPayed - price;

       int dollars = (int)changeDue;

       System.out.println("Return"+ dollars+ "Dollars");

       scan.close();

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

In the multi-tiered database architecture, is it possible for there to be no
database on a particular tier? If not, why?

Answers

Answer:

it is possible

Explanation:

Please fill in the blank below.
The preferred resolution for any print project is
Input Answer
dpi.
Input Answer
0000
dpi, and the optimum resolution for a web project is
METRIY

Answers

The preferred resolution for any print project is 300 dpi, and the optimum resolution for web is 72 dpi.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

For any print project, the preferred resolution is typically 300 dpi, while the optimum resolution for web is typically 72 dpi.

Note: dpi is an abbreviation for dots per inch.

In this context, we can reasonably infer and logically deduce that the preferred resolution for any print project is 300 dots per inch (dpi), and the optimum resolution for web is 72 dots per inch (dpi).

Read more on resolution here: https://brainly.com/question/28182244

#SPJ1

Complete Question:

The preferred resolution for any print project is __________________ , and the optimum resolution for web is ___________________.

answer choices

300 dpi, 72 dpi

72 dpi, 300 dpi


There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
decreased
decreased then increased
O increased
O stayed the same
Please help, if you help good luck will come your way :)

Answers

There is a surplus of scientific researchers for a vaccine. This means the demand for this career has increased. Thus, option C is correct.

What is the vaccine?

A vaccination often comprises a substance that simulates a germ that causes the disease; this substance is frequently created from the bacteria's weaker or dead versions, its poisons, or another of its glycoprotein.

There are various successes of science researchers for a vaccine but vaccine, so the career demand would be to increase as the people will be the demand to find the new vaccine for the disease which is being gone on. Therefore, option C is the correct option.

Learn more about vaccine, here:

https://brainly.com/question/6683555

#SPJ1

define term processor​

Answers

The term processor may be defined as the part of the computer or any other electronic gadget that significantly to and process the fundamental instructions that drive the specific system.

What are the functions of the Processor?

The functions of the processor are as follows:

Input and insert the command which is required for the processing of data and instructions. Retrieving the output of the given instructions. Regulates the overall functions of the devices and systems.

According to the context of this question, the processor is important for any instrument which works on the input and delivers the output. For example, mobile phones, computer systems, DVD players, washing machines, etc.

Therefore, the definition of the term processor is well described above.

To learn more about Processors, refer to the link:

https://brainly.com/question/614196

#SPJ1

Type the correct answer in the box. Spell all words correctly.

Ben is giving a presentation on digital media. Help him complete the following sentence.

The term digital media represents any media containing audio, video, and/or _______ content that are presented in a digital format.​

Answers

Answer:

The answer to the dash is "Audio-visual"

Other Questions
what elements of the national business environment might influence your decision on where to move production? The recent recessions in the us have been referred to as jobless recoveries. what factors allow for, or contribute to, a jobless recovery? Stratovolcanoes Mt. Saint Helens, WA. Fly to Mt. Saint Helens in the Cascade Range of western Washington, and then turn on the Mt. Saint Helens Contour Map overlay. The brown lines are contours (lines of equal elevations). Use the Ruler tool to determine the horizontal distance (ft) between the Problem 7 placemarks and then subtract the elevations (ft) for each placemark from the contour map to determine the relief (vertical distance). Find the slope angle of Mt. Saint Helens using the following formula (this value is representative for many composite cone volcanoes): slope angle = tan1 (relief horizontal distance) Choose one: 510 1520 2535 3545 An Inspector Calls: HELP I NEED THE ANSWER ASAP 100 pts. and branliestWrite a PEEL paragraph of how Mr. Birling shows poor fatherhood throughout the play.P - PointE - EvidenceE - EvaluateL - Link how could you prove that dissolving table salt in water is a physical property, not a chemical change A scale drawing of a rectangular park is 6 cm wide and 10 cm long. The actual park is 180 meters wide. What is the area of the actual park in square meters? Which statement is not a common scientific theory about the creation of the solar system? O The solar system formed 4.6 billion years ago. O The process started with the collapse of a nebula. O As the sun formed, the planets also formed from space dust and gaseous matter. O Only the planets were formed by chunks of debris. during the civil war the union navy cumulative exam What is planning? Choose the answer.O illustrating the hierarchy and work teams within a companyability to make short- and long-term company direction and goalsallows management to set standards, control costs, and manage changeguiding employees towards achieving company goals Paolo can walk three dogs or mow two lawns in two hours. ashanti can walk six dogs or mow three lawns in two hours. ashanti's opportunity cost for each additional dog walked is? What quote does Jefferson make about how bad the government treated the American colonists The ________ is a budget based on multiple levels of projected sales or production.a. static budget b. standard budget c. fixed budget d. flexible budget Which type of design could be used to measure how relationship satisfaction changes over time? The real-life events depicted in the documentary catfish exemplify the problem of ________ online. Words that frequently accompany arguments and signal that a premise or conclusion is present are known as? The fancy cakes in the display window ____delicious. what best describes the reason for using a personal behavior checklist?to identify past personal achievementsto identify past personal achievementsto compare present achievements to baseline effortsto compare present achievements to baseline effortsto identify areas of personal health that need improvementto identify areas of personal health that need improvementto identify ways in which behavior has improvedto identify ways in which behavior has improved What type of atom has been assigned a mass in order to act as a comparison for other types of atoms? Describe the major features of the island as shown in your topographic map. For each feature, explain howyou know what it is from the map. Are there peaks? If so, how high are they? Are there valleys? If so, howlong are they and how deep are they compared to the surrounding sides? If present, how high are any cliffs The _______ transmission of violence occurs when abused children mature and become abusive parents. a. inherited b. intergenerational c. familial d. genetic