1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
12

Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha

sed last year. This is an example of ________ segmentation.
Computers and Technology
2 answers:
joja [24]3 years ago
4 0

Answer:

User rate segmentation

Explanation:

Segmentation is a process of classifying a group of variable of entities based on a value or standard. It categorizes these variable to map out and round up a collection of similar values.

User rate segmentation is a process of segmenting a group of users based on the rate at which a product or service was used. The number of time at a given period of time determines the category the user should be.

kumpel [21]3 years ago
3 0

Answer:

Usage rate segmentation

Explanation:

Usage rate segmentation is the type of segmentation that divides a market or consumer based on how much of a product or brand they have used or based on their patronage.

This division is based on whether they are non users or light users, or medium or heavy users. This segmentation also helps to determine the satisfaction derived from a product or brand.

You might be interested in
To move an icon, you right-click it and select “Pin to start menu.” True False
tester [92]

"To move an icon, you right-click it and select “Pin to start menu.” True False"

False

4 0
3 years ago
Read 2 more answers
The Bradshaw family has $200,000 of total assets and $140,000 of liabilities. What is their net worth?
3241004551 [841]

Answer:

$340,000 is there net worth

Explanation:

$200,000+ $140,000 = $340,000

5 0
3 years ago
Mika forgot to put in the function name in his function header for the code below. What would be the best function
kondaur [170]

Answer:

I think it's A, def drawDiamond():

Explanation:

5 0
3 years ago
In Mandatory Access Control sensitivity labels attached to object contain what information?
larisa86 [58]

Answer:b)The item’s classification and category set

Explanation: Mandatory access control(MAC) is the security component in the computer system. It is regarding the controlling the access of the operating system by the administrator.The accessing is made limited by the MAC according to the sensitivity of the data .

The authorization for user to access the system is based on this sensitivity level known sensitivity label. The objects contain the information regarding the classification and categories or level of items. Thus, the correct option is option(b).

7 0
3 years ago
Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choo
stellarik [79]

Answer:

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

Explanation:

Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

3 0
4 years ago
Other questions:
  • You are creating a budget for your new business.What should you include
    15·1 answer
  • A drop-down menu must be contained by
    5·1 answer
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are
    9·2 answers
  • Your motherboard supports dual channeling and you currently have two slots populated with DIMMs; each module holds 2 GB. You wan
    6·2 answers
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
    12·1 answer
  • What is a trojan horse
    8·2 answers
  • Neview of related literature happens in two wayo (1) Traditional and
    6·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
  • What is the purpose of the Subtotal feature?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!