1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
4 years ago
12

Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha

sed last year. This is an example of ________ segmentation.
Computers and Technology
2 answers:
joja [24]4 years ago
4 0

Answer:

User rate segmentation

Explanation:

Segmentation is a process of classifying a group of variable of entities based on a value or standard. It categorizes these variable to map out and round up a collection of similar values.

User rate segmentation is a process of segmenting a group of users based on the rate at which a product or service was used. The number of time at a given period of time determines the category the user should be.

kumpel [21]4 years ago
3 0

Answer:

Usage rate segmentation

Explanation:

Usage rate segmentation is the type of segmentation that divides a market or consumer based on how much of a product or brand they have used or based on their patronage.

This division is based on whether they are non users or light users, or medium or heavy users. This segmentation also helps to determine the satisfaction derived from a product or brand.

You might be interested in
Which type of element is , and what is the meaning of that element?
Korvikt [17]
Black #1 I wanna say
5 0
3 years ago
A Java main method uses the parameter (String[ ] variable) so that a user can run the program and supply "command-line" paramete
xxTIMURxx [149]

Answer:

True

Explanation:

Java and some other object oriented programs makes use of the command line arguments. This enables one to pass additional information to a program when it is run. whatever information that is passed to the program at the command line argument will accompany the program when is it run and java stores this information as an array of strings.

4 0
3 years ago
Lucinda is a network manager. She wants to set up a small office computer network so that it will not be affected at all by elec
Katena32 [7]

Answer:

The network media she should use is;

E. Shielded twisted-pair

Explanation:

A network connection that will not be affected by electrical or electromagnetic interference is a shielded twisted pair cable

Electromagnetic interference, EMI, is an externally originating disturbance that has an impact on electrical circuits through electromagnetic induction, direct conduction, or electrostatic coupling, with the possible effect of circuit degradation or disruption

EMI can be prevented by the use of shielded twisted pair (STP) cabling that provides a barrier that reduces the effect of external electromagnetic fields and transports the current induced to the ground through a grounding wire

4 0
4 years ago
Cite an early photographic pioneer or invention. Explain their/its impact on photography as we know it today.
ch4aika [34]
“Opium is a type of a drug,it can be a weed or a narcotic.” (Opium not Acid or Weed
8 0
3 years ago
Exposing employee and customer personal data to an untrusted environment is an example of:
jonny [76]

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

8 0
3 years ago
Other questions:
  • The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw
    6·1 answer
  • Why Unicode is the standard way of converting binary to text?
    8·1 answer
  • What are sums of money that are given out for specific reasons?
    5·2 answers
  • The CPU (central processing unit), also known as a processor, is considered the brain of the computer. What is the CPU’s functio
    6·1 answer
  • What is the standard markup language of the world wide web?
    14·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate.
    11·1 answer
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • What are the two broad categories that individual definitional techniques fall under? Check all that apply. Demonstrative defini
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!