1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
9

Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a

bout consumers and online buying, but Dillard’s believes its customers might be different from the usual online consumer profile, so it decides to conduct its own study. If Dillard’s were to use the available data about consumer attitudes, it would be using ___ data; however, if Dillard’s does its own study it would collect ______ data.
Computers and Technology
1 answer:
Kamila [148]3 years ago
4 0

Answer:

Indirect/secondary source; direct/original source.

Explanation:

Data is a vital piece of information. It is generated from various physical or abstract activities. There are different sources of data. They are direct source, indirect source, static source, dynamic source etc.

The direct source is also called the original source data because information gotten from it is directly retrieved from a target audience or observed samples. Indirect or secondary source data is gotten from an already existing databases, which may or may not have been used for analysis.

Static source data hardly changes or updates while dynamic sources updates constantly.

You might be interested in
Binary is best interpreted by a computer because?
Tomtit [17]
The answer is d. The hardware has a terrible time translating binary into decimal. Computers in general don't like "talking"  to people. D is wrong.

bits are part of bytes.You use bits to make up bytes, not the other way around. Bit's are what computers use to construct their "speech." Bytes make it more convenient to convert from Hex(or binary) to decimal. C is wrong.

A is wrong. There are only two numbers in the binary system -- one and zero. Not three.

B is the correct answer.

4 0
3 years ago
Read 2 more answers
Any correct answers will be helpful.
melisa1 [442]

Answer:

is this overdue

Explanation:

it probly is you are smart you can do this

5 0
3 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
Alexxandr [17]

Answer: name, file stream object

Explanation:

4 0
2 years ago
Mathematics and computer science share many concepts, such as recursion.
Virty [35]
The answer is B.

Read the answer I posted for your other question on the factorial of 7.
5 0
2 years ago
Other questions:
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft. Angelina has decided to add t
    12·2 answers
  • Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an i
    7·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • It is an array containing information such as headers, paths and script locations wherein it is created by the web server itself
    8·1 answer
  • What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 3 1 4 2
    14·2 answers
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • A connection between files that allows data to be transferred from one file to another is a _______________________.
    6·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!