1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
7

Elaine had a problem with the computer printer she purchased. When she called the toll-free service number, she was told that sh

e had to pay to speak to a service representative. It made her so unhappy that she told all of her friends and family about the problems she faced and advised them against buying that brand. Which of the following is best exemplified in this scenario?
Computers and Technology
1 answer:
Lisa [10]3 years ago
4 0

Answer:

e. Negative word-of-mouth

Explanation:

Negative word-of-mouth is defined or can be described as the information passed by an unhappy customer stating his/her dissatisfaction from buying a company product or for any form of service given.

Elaine not being satisfied with the product and the fact she will be using money to call customer care left her with bad taste of the product. She resorted to discourage others from patronising the store.

Negative word of mouth can go a long way to discourage people from using a brand.

You might be interested in
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
In windows 10, where would you save the template so it is available in the available templates list in backstage view?.
wolverine [178]

Answer:

got to \Username\Documents\CustomOfficeTemplates

Explanation:

6 0
3 years ago
Which safety issue is considered to be a data safety issue?
Andrews [41]
<span>Computer and technology-related dangers to an individual's personal, financial, emotional or physical well-being are considered as data safety issues.
There are several things you should do to prevent computer dangers: </span><span>make regular backups of files, protecting yourself against viruses (use an anti-virus software) , <span>use a  passwords so that access to data is restricted, use a firewall , </span></span>
4 0
4 years ago
A Website that was once quite popular with younger visitors has lost some of its allure and traffic. How can you develop an audi
Alex787 [66]

Answer:

d. add animations to the site.

7 0
3 years ago
When creating an HTML document, what do we use to set aside space for content?
Minchanka [31]

Tags are use to set aside space for contents

<h3 /><h3>What is HTML?</h3>

HTML simply means hypertext mark-up language . This is a language for document that are design to be displayed in the web browser.

Tags are HTML codes that defines how a web browser will format and display the content.

The tags is used to set aside space to accommodate contents. Example of tags are header tags(<h1>, <h2>, <h3>, <h4>, <h5> and <h6>), paragraph tag(<p>).

learn more on HTML here: brainly.com/question/9069928

5 0
3 years ago
Other questions:
  • Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20
    8·1 answer
  • How do you represent a 3D object with unusual curves in 2D space? CAN SOMEONE HELP PLEASE
    12·1 answer
  • How do u beat sonic unleashed
    8·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    15·1 answer
  • What techniques are required to accept
    12·1 answer
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • Sketch f(x) = 5x2 - 20 labelling any intercepts.​
    13·1 answer
  • Please define processor​
    14·1 answer
  • Discuss how classification systems have undergone several changes over a period of time.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!