You are trying to sell a new product to a store owner. Which method of presentation
is likely the most effective?

A. a chart showing how sales will go up if they use this product
B. quotes from other store owners on success of this product
C. a free trial option to use the product for six months, no questions asked
D. all of the above

(10pts)

Answers

Answer 1
I would have to say answer b

Related Questions

____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

I believe "Work-Shift" should be in the blank

Son las características de la topología anillo *
5 puntos
Opción 1 Todas las terminales son inteligentes.
Opción 2 Todas las terminales son brutas.
Opción 3 Todas las terminales almacenan.

Answers

The 3rd onee i think if not 4th

Language modeling incorporates rules of __. Select all that apply.

A. story structure

B. grammar

C. dictionary definitions

D. pronunciation patterns

Answers

Language modeling incorporates rules of grammar and pronunciation patterns

Language modeling  is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences.  is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.

Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns

Learn more from

https://brainly.com/question/6214562

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described

Answers

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

Which of the following best describes the original meaning of the term hacker?

Skilled computer user
Dangerous cybercriminal
Beginning computer programmer
Computer virus developer

Answers

Answer:

Dangerous cybercrimina

Explanation:

Answer:

Skilled computer user and computer virus developer

Explanation:

Preset headers and footers cannot have additional information add to the areas.
Group of answer choices

True

False

Answers

the answer to the question is true

_____ selling is used when a product is sold from one business to another .

Answers

Answer: cross-selling

Explanation: is the action or practice of selling an additional product or service to an existing customer. In practice, businesses define cross-selling in many different ways.

what is an indication that malicious code is running?

Answers

Answer:

If you are running Windows check task manager and see if any background process if running if there is a background process of command prompt or powershell, there is a chance that there is a backdoor running in your system, you can just right click and end the task it should just kick the hacker off the server.

please give brainliest

Order the steps to creating a new rule to handle meeting request responses in Outlook

Answers

Answer:

posting this. your photo order is correct.

Explanation:

This type of cable is used to connect the keyboard and mouse to the computer:

PS/2 cable
Ethernet cable
HDMI cable
DVI cable​

Answers

Answer:

I'm going to have to go with PS/2 cable

Explanation:

did some research

it's the ps/2 cable

ethernet cables are for wifi

hdmi connects computer to the monitor

dvi connects to an older type of monitor

Name any four constituent of the 8085 microprocessor.

Answers

Answer:

The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.

Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.

What is the configuration state of the 8085 microprocessor?

The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.

According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.

Therefore, some common constituents of the 8085 microprocessor are well described above.

To learn more about the microprocessor, refer to the link:

https://brainly.com/question/29243062

#SPJ5

an error occurred while loading a higher quality version of this video

Answers

Answer:?

Explanation:?

where is the scroll bar located inside a web browser?

Answers

The Scroll Bar is the narrow space in your browser window just to the right of the content area.

Scroll bar is located on the right hand side of the screen edg 2025

a modem is required for ________________ internet access.

Answers

Broadband I believe!

what is the version number for mysql returned from port 3306

Answers

Answer:

For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.

You have just received a new laptop that you will use on your company network and at home. The company network uses dynamic addressing, and your home network uses static addressing. When you connect the laptop to the company network, everything works fine. When you take your laptop home, you cannot connect to devices on your home network or to the internet.

Required:
What could have been the reason for that?

Answers

Answer:

The network address can be the reason. You need to modify it so you can have access.

Consider the following declarations:

class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration

Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?

Answers

Answer:

12, 5, 2, 3

bagType

Explanation:

I just did it

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Answers

computer forensics is the answer

Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they view the bright images on the page. Which design principle is Cathy using?

Answers

Answer:

dominance

Explanation:

i just took it and got it right

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

The ethernet cable is also known as? *
Cat 5 cable
Wan cable
RD-45 cable
Sat 5 cable​

Answers

Answer:

Cat 5 cable

Explanation:

The ethernet cable is also known as Cat 5 cable.

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

what is the most common type of storage device for transferring files from one computer to another?

Answers

Answer:

USB flash drives is the most common type of storage device for transferring files from one computer to another

what does a exponent do in excel ?​

Answers

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way? Check all of the boxes that apply.

checking social media networks during working hours

surfing the Internet during working hours for what to do on the weekend

downloading a favorite band’s latest album from a file-sharing service

Answers

Answer:

All of the above.

Explanation:

You shouldn't be doing any of these things using your employer's computer networks, even if there aren't any explicit rules against them. For one thing, your usage of company systems and networks is being continuously monitored, so you can forget about trying to get away with it. Checking social media and surfing the internet can expose parts of your personal life that you don't want anyone else to see, and downloading anything from anywhere is dangerous, especially if you're pirating music from some backwater site where adult sites and survey scams are waiting to bombard the whole network with pop-up ads. You should always do these things on your personal devices while connected to your personal home network.

what is the first thing you should do when you open a savings account

Answers

Answer:

Compare your options. There are many financial institutions that offer savings accounts. .

Explanation: PLS MARK BRAINLIEST

Other Questions
Plz I need help will rate 5 stars the lysis of red blood cells in blood agar is indicative of the presence of which enzymes? how does impresionist art differ from expressionist art give at lease two comparison for each (5, -3) move it seven units to the left amd one unit up. Please help- 1. Name two countries with arithmetic densities of 200+ persons per square. kilimeters.2. Name two countries with arithmetic densities of below 50 persons per square. kilimeters. 3. Low arithmetic density=______ total population. OR _________ total land4. Costa Rica & UAE both have a population of 4 million. Costa Rica has a physical density of 1803, & UAE has a physical density of 6404. This means which has more arable land?5. What can you infer about a countrys amount of arable land if there is a large difference between its arithmetic density & physiological density?6. More Developed Countries (MDCs) usually have __________ (higher or lower?) agricultural densities than Less Developed Countries (LDCs).7. Explain why MDCs dont have (or need) as many farmers per unit of arable land as LDCs.Can you help me answer these 7 questions they are due tonight by 8:00 PM Boris needs to memorize words on a vocabulary list for French class. He has memorized 24 of the words, which is two-thirds of the list. How many words are onthe list? Helpppppppppppppppppp!!! In this picture, mX?A 52B 20C. 2.8D 7 Missouri compromise of 1820 compromise of 1850 Kansas Nebraska act 1854 how do each of the act impact the spread of slavery within the United States. A. Each act left the decision regarding the spread of slavery to the individual states. B. Each act was an attempt to balance the demands of northern southern states. C Which act helped to maintain a balance between free and slave states. D. Each act limited slavery to places where it already existed an animal, that has gained new genetic information from the acquisition of foreign dna, is called a Can anyone help here ? 1944 divided by 32.40 An arrow fired horizontally at 44m/s travels 23m horizontally before it hits the ground From what height was it fired? Nakisa spent $328 on a total of 22 CDs and DVDs. If CDs cost $12 each and DVDs cost $16 each, how many CDs did Nakisa buy? the area of 1.25 and 0.8 Given (x 7)2 = 36, select the values of x.---x = 13---x = 1x = 29x = 42Given (x 1)2 = 50, select the values of x.x = 49x = 51---x=1+5 root 2---x=1-5 root 2 Help please 6th grade math The ideas of the Enlightenment, including the concept of the social contract, influenced the American Revolution. Which of these statements best explains what a social contract is The zoo needs to replace some of the railroad tracks that support their train ride. The total length of the track is 500 feet,and there are three sections that need to be replaced. These sections measure 61, 83, and 63 feet. How much of the zoorailroad track does not need to be replaced? An is good looking and well be haved (not only)