1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miv72 [106K]
3 years ago
8

Sendstars is a package delivering company that recently made a study on its customer retention and service renewal metrics. They

found that most customers defected from using Sendstars' services due to customer dissatisfaction stemming from delivery personnel being rude or ill-mannered. To curb this issue, Sendstars gave special training to its employees in customer service.
Which of the following data mining approaches did Sendstars employ when they decided to train their employees in customer care based on the study?

A. association
B. classification
C. cause-and-effect modeling
D. reduction
Computers and Technology
2 answers:
ozzi3 years ago
5 0

Answer:

C. cause-and-effect modeling

Explanation:

Data mining is a process in data analysis that sources, extracts and streams data from source database to the computing device. It provides data in categories to computers for easy analysis. There are different approaches to data mining, they are association, classification, cause and effect modeling, reduction etc.

Classification clusters data based on similarity, association is based on the number or value, while cause and effect modeling describes a cluster of outputs based on a certain incident.

masya89 [10]3 years ago
3 0

Answer: C. Cause and Effect Modelling.

Explanation:

Data Mining is a technique which aims at obtaining important and useful information in a stockpile of data. This in turn would prove useful in making predictions. It would also inform present decisions.

The Cause and Effect modelling approach explains that for every given action ( effect ), there was a prompting factor ( cause ).

In the case of Sendstars Company, the downward spiral in customer retention was as a result of ill -mannered staff. This effect, prompted the decision to have the employees trained on customer service.

You might be interested in
Which of the following are downlink transport channels?
Hunter-Best [27]
I think it’s a or b
4 0
2 years ago
Hi I need help, This assignment is for Assignment 6 Question 4 in edhesive for computer science. here is the prompt:
Alex17521 [72]

Answer:

Following are the python code to print the given pattern:

print('FOURTH') # using print method

for i in range(10): #using loop to count numbers

   for j in range(10-i): # use loop to print asterisk value in reverse order

       print("*", end=" ") #print value

   print("") #using print method for space

Output:

Please find the attachment.

Explanation:

The description of the above python program can be described as follows:

  • In the first line, use the print method, that print message "FOURTH".
  • In the next line, two for loop is used in which the first loop counts the number to be print value, inside the loop another for loop is used.
  • In this loop, it prints asterisk values in its reverse order and for new lines, it will use the print method with a single white space.

7 0
2 years ago
What can you do to keep safe when using a ladder?
dexar [7]
If the ladder is not stable, it is better to have someone hold the ladder in the bottom ( only someone who is strong and confident)
6 0
3 years ago
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
Suppose we have a String object called myString. Write a single line of Java code
VikaD [51]

Answer:

myString=myString.toUpperCase();

Explanation:

In java to change all characters of a string to upper case we use .toUpperCase() method.It will convert string to upper case.

Implementation in java.

import java.util.*;

class Solution

{

public static void main (String[] args) throws java.lang.Exception

{

   try{

Scanner scr=new Scanner(System.in);

System.out.print("Enter a string:");

String myString=scr.nextLine();

myString=myString.toUpperCase();

System.out.println("string in upper case : "+myString);

         }catch(Exception ex){

       return;}

}

}

Output:

Enter a string:hello

string in upper case : HELLO

5 0
3 years ago
Other questions:
  • An important advantage of using GUI data-entry objects is that you often can control what users enter by limiting their options?
    6·1 answer
  • A python keyword______.
    6·1 answer
  • The operating cost of driving include
    11·1 answer
  • Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
    6·1 answer
  • Theodor is researching computer programming. He thinks that this career has a great employment outlook, so he'd like to learn if
    9·2 answers
  • Which of these causes the most collisions?
    14·1 answer
  • Which graph is the solution to the system 2x – 3 and y &lt; 2x + 4?
    5·2 answers
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • Is a dot matrix printer an impact or non-impact printer
    12·2 answers
  • What are price comparison websites?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!