1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
2 years ago
7

Identify and explain 4 traditional (old ways) marketing approaches used by University uses in reaching

Computers and Technology
1 answer:
erastova [34]2 years ago
8 0

Based on the information given, it should be noted that the traditional marketing techniques that can be used are:

  • Billboards.
  • Direct mail.
  • Signage.
  • Flyers.

<h3>What is marketing?</h3>

Marketing simply means they action that is used to promote one's business and it includes marketing research and advertising.

The traditional marketing approaches used by the University in reaching out to potential students without the medium of technology include Billboards, Direct mail, Signage, and Flyers.

Learn more about marketing on:

brainly.com/question/25369230

You might be interested in
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
cestrela7 [59]

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

7 0
3 years ago
Sarah is having a hard time finding a template for her advertising buisness that she mah be able to use at a later date and also
irinina [24]

Answer: create a custom template

Explanation:

Since Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later date and also make it available to her colleagues, her best option will be to create a custom template.

Creating a custom template will ensure that she makes the template based on her requirements and can tailor it specifically to her needs which then makes it unique.

6 0
3 years ago
It can be useful to have a mentor because they will help you
MArishka [77]
Get comfortable quickly
3 0
4 years ago
Read 2 more answers
Firms attempt to maximize their revenue by producing more product at ______ prices.
mixas84 [53]
The answer is C, higher.
4 0
3 years ago
What is the function of a breadcrumb trail in a website ?
Colt1911 [192]
Breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites.

The term originates from the trail of bread crumbs left by Hansel and Gretel in the fairy tale of the same name.

traces the steps between different web pages and additional information

7 0
3 years ago
Read 2 more answers
Other questions:
  • Can't expand stack segment by 8 bytes to 524288 bytes.
    5·2 answers
  • I need help please <br> just plug in the words with their definitions.......
    10·2 answers
  • Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
    13·1 answer
  • websites in which a question appears at the top with boxes underneath that help answer the question are called?
    10·1 answer
  • How would you define a relational database ?
    12·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • This diagram shows who is responsible in preventing cyberbullying. A flowchart. Top box is labeled Cyberbullying can be prevente
    14·2 answers
  • ____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
    15·2 answers
  • Why wouldn't a game using just run-length encodings be challenging?
    9·1 answer
  • ¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!