1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
12

Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha

sed last year. This is an example of ________ segmentation.
Computers and Technology
2 answers:
joja [24]3 years ago
4 0

Answer:

User rate segmentation

Explanation:

Segmentation is a process of classifying a group of variable of entities based on a value or standard. It categorizes these variable to map out and round up a collection of similar values.

User rate segmentation is a process of segmenting a group of users based on the rate at which a product or service was used. The number of time at a given period of time determines the category the user should be.

kumpel [21]3 years ago
3 0

Answer:

Usage rate segmentation

Explanation:

Usage rate segmentation is the type of segmentation that divides a market or consumer based on how much of a product or brand they have used or based on their patronage.

This division is based on whether they are non users or light users, or medium or heavy users. This segmentation also helps to determine the satisfaction derived from a product or brand.

You might be interested in
The incandescent test lamp is used to check for the presence of
Arisa [49]
Http://americanhistory.si.edu/collections/search/object/nmah_995750
4 0
2 years ago
Please check my answer! (Java)
Nat2105 [25]

9 is the correct answer. 4*2=8 loops are executed, moving the count from 1 to 9.

8 0
3 years ago
_____ is the unauthorized entry into a computer system via any means
Montano1993 [528]
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
4 0
2 years ago
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
Which of the following is an example of an application software?
pishuonlain [190]
Word processing software
6 0
2 years ago
Other questions:
  • A method in a class that modifies information about an object is called a/an ____ method.
    14·1 answer
  • Select the correct answer.
    6·1 answer
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • A program that coaches you at each step in the process is said to have a(n)
    12·2 answers
  • As with country citizenship, with digital citizenship comes _____.
    14·2 answers
  • Front and rear camber and toe settings are being adjusted during a four-wheel alignment. The correct order for performing these
    13·1 answer
  • Meaning and explanation of fortran​
    11·2 answers
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
  • which responses would you use for a computer or electronic medical record outage? (select all that apply)
    8·1 answer
  • a data analyst is working with a spreadsheet that has very long text strings. rather than counting the characters themselves to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!