1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
12

Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha

sed last year. This is an example of ________ segmentation.
Computers and Technology
2 answers:
joja [24]3 years ago
4 0

Answer:

User rate segmentation

Explanation:

Segmentation is a process of classifying a group of variable of entities based on a value or standard. It categorizes these variable to map out and round up a collection of similar values.

User rate segmentation is a process of segmenting a group of users based on the rate at which a product or service was used. The number of time at a given period of time determines the category the user should be.

kumpel [21]3 years ago
3 0

Answer:

Usage rate segmentation

Explanation:

Usage rate segmentation is the type of segmentation that divides a market or consumer based on how much of a product or brand they have used or based on their patronage.

This division is based on whether they are non users or light users, or medium or heavy users. This segmentation also helps to determine the satisfaction derived from a product or brand.

You might be interested in
Previous
spin [16.1K]

Answer:

A b output 0110111111001111

7 0
3 years ago
Compare and contrast system software and generalised software
jekas [21]
System software is a type of computer program that is designed to run a computer’s hardware and application programs.
Generalized software refers to software designed to read, process and write data with the help of functions performing specific audit routines and with self-made macros.
3 0
3 years ago
14. How do digital libraries address the problem of digital exclusion?
loris [4]

The digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

<h3>What does it mean to be digitally excluded?</h3>

The  digital exclusion  is known to be also as digital divide and this is known to be where a part of the population is known to possess a continuous and unequal access and capacity in regards to the use Information and Communications Technologies (ICT),

Note that IT are very essential for all to be fully participated  in the society and the digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.

Learn more about digital exclusion from

brainly.com/question/7478471

#SPJ1

3 0
2 years ago
Which three options below describe typographic hierarchy?
Korvikt [17]

The three options that describe the typographic hierarchy are given below:

  • The importance of information is shown through the text.
  • The presentation of the text in terms of structure.
  • The placement of the text defines its flow and hierarchy.

Thus, the correct options are A, B, and C.

<h3>What is Typographic hierarchy?</h3>

Typographic hierarchy may be characterized as an approach that utilizes typography: the size, font, and layout of distinct text components to produce a hierarchical division that can authenticate users where to look for specific information.

The purpose of using this methodology is to focus on the main points of the article accordingly. It increases the sense of understanding of the readers with focus.

Therefore, it is well described above.

To learn more about Typographic hierarchy, refer to the link:

brainly.com/question/12076206

#SPJ1

3 0
2 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Other questions:
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • As you type your outline, click Demote to move a line of text
    13·2 answers
  • Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud.
    13·1 answer
  • Produce definition in computer
    9·2 answers
  • Types of data processing
    5·1 answer
  • How does the number of jobs in internet media compare to the number of jobs in tv broadcasting and print media?
    11·1 answer
  • GIF is example of raster image<br><br><br> RIGHT OR WRONG?
    15·1 answer
  • Password ____ traverse the network searching for passwords from remote authentication systems.
    6·1 answer
  • Python Programming
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!