1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
8

Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They

found that most customers defected from using Sendstars' services due to customer dissatisfaction stemming from delivery personnel being rude or ill-mannered. To curb this issue, Sendstars gave special training to its employees in customer service.
Which of the following data mining approaches did Sendstars employ when they decided to train their employees in customer care based on the study?

A. association
B. classification
C. cause-and-effect modeling
D. reduction
Computers and Technology
2 answers:
ozzi3 years ago
5 0

Answer:

C. cause-and-effect modeling

Explanation:

Data mining is a process in data analysis that sources, extracts and streams data from source database to the computing device. It provides data in categories to computers for easy analysis. There are different approaches to data mining, they are association, classification, cause and effect modeling, reduction etc.

Classification clusters data based on similarity, association is based on the number or value, while cause and effect modeling describes a cluster of outputs based on a certain incident.

masya89 [10]3 years ago
3 0

Answer: C. Cause and Effect Modelling.

Explanation:

Data Mining is a technique which aims at obtaining important and useful information in a stockpile of data. This in turn would prove useful in making predictions. It would also inform present decisions.

The Cause and Effect modelling approach explains that for every given action ( effect ), there was a prompting factor ( cause ).

In the case of Sendstars Company, the downward spiral in customer retention was as a result of ill -mannered staff. This effect, prompted the decision to have the employees trained on customer service.

You might be interested in
❤️❤️❤️❤️❤️❤️❤️❤️IS THERE ANYONE'S STILL AWAKE?? HMM HEHE I'M HERE AGAIN~~~ FOLLOW ME FOR MOR3~~​
insens350 [35]

Answer:

hello?

Explanation:

3 0
2 years ago
Read 2 more answers
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
3 years ago
C program how to input this? ​
Neporo4naja [7]
Chchvjvcuvggiiog. Correct
3 0
3 years ago
Select the correct answer from each drop-down menu. Which two factors do ergonomic principles consider a part of a job? Ergonomi
Rudiy27

Answer:mental stress

Explanation:

4 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
Other questions:
  • To become a news anchor, you should get a Bachelor's degree in:
    11·2 answers
  • Interior gateway protocols are used by routers in order to share information within a single
    9·1 answer
  • Look act the picture
    5·1 answer
  • Live.com is Microsoft's free web-based email provider.<br> A. True<br> B. False
    6·1 answer
  • How do I get more points?
    13·2 answers
  • Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ name
    9·1 answer
  • which of the following memory types cannot store the data for information permanently Ram chachi Flash Memory hard disk​
    8·1 answer
  • Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu
    10·1 answer
  • What is a geam in the ggplot2 system?
    5·1 answer
  • Pleassseeeee helppp!!!!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!