1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
4 years ago
5

Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view

of her selection and additional information that will help her make a decision. When she adds the jeans to her cart, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Janelle and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailers units per transaction. The technology that generates this type of intelligence and personalization is called
A. social media
B. cookie mining
C. Web 2.0
D. Web 3.0
Computers and Technology
1 answer:
Kay [80]4 years ago
5 0

Answer:

B) Cookie mining

Explanation:

A cookie also called http/web/internet cookie are small pieces of information that your web browser stores on your computer while you browse the internet, they are designed to help  websites keep a record the user's browsing activity. The information stored as cookies can be minned to discover patterns and users' preferences, as it is in the question scenario, a recommendation system has been implemented using the saved cookies

You might be interested in
Do you like Houseparty?
steposvetlana [31]
Yes it’s really fun
3 0
4 years ago
Which type of password would be considered secure
max2010maxim [7]
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
5 0
4 years ago
Read 2 more answers
Create a cell reference in a format by typing in the cell name or
Neko [114]

Answer:

D. Create a cell reference in a formula by typing in the cell name or clicking the cell.

Further Explanation:

To create a cell reference in a formula the following procedure is used:

First, click on the cell where you want to add formula.

After that, in the formula bar assign the equal (=) sign.

Now, you have two options to reference one or more cells. Select a cell or range of cells that you want to reference. You can color code the cell references and borders to make it easier to work with it. Here, you can expand the cell selection or corner of the border.

Again, now define the name by typing in the cell and press F3 key to select the paste name box.

Finally, create a reference in any formula by pressing Ctrl+Shift+Enter.

6 0
3 years ago
What type of strategy is being used by a website like www.CNNMoney when it describes itself as ""a one-stop destination covering
alina1380 [7]

Answer:

Positioning

Explanation:

One of the most important concept of marketing is Positioning. It is a marketing concepts that provides a description of what businesses must do to ensure its products are marketed and its services rendered to customers. When positioning your organization, the image of the organization's product is created with its intended audience in mind, by using promotion, place, product, and price.

4 0
3 years ago
Read 2 more answers
Overview of your opinion of Digital Etiquette
Bas_tet [7]

Answer:

The basic idea behind the topic of digital etiquette is "treat others how you want to be treated." From an early age, students are taught this golden rule. Whether at home, at the movies, at a grocery store or in school, students learn that there are appropriate and inappropriate ways to behave and treat one another. With the overwhelming emerging technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behavior into the digital world.

4 0
3 years ago
Other questions:
  • You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration offic
    12·1 answer
  • What are three things to consider in programming design?
    14·1 answer
  • A video game character prefers to take enemies on from a distance. What skills might such a character have?
    11·2 answers
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • The special operator used to check for similar character strings is ____.
    13·1 answer
  • Command-based operating systems include
    7·1 answer
  • 1. Assume that in an implementation of the RSA cryptosystem one modular squar- ing takes 75% of the time of a modular multiplica
    15·1 answer
  • OMG 2 TIMES ;DDDDDDDDDDDDDDDDD​
    14·1 answer
  • A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!