1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
6

Psychographics may also be called A. personality analytics. B. social group dynamics. C. lifestyle analysis. D. opinion insight.

E. attitude measures.
Computers and Technology
1 answer:
alexandr402 [8]3 years ago
5 0

Answer:

The answer is "Option C".

Explanation:

Psychographics is a descriptive technique, which used only to describe the physiological observable behaviors. Throughout the analysis of characteristics, beliefs, views, behaviors, desires, and lifestyles, psychographs were added, that's why it is known as lifestyle analysis, and the wrong option can be described as follows:

  • In option A, It is a test, which is used in employment.
  • In option B, It is used to focus on the awareness of bigotry, misogyny, racial inequality, and other forms.
  • Option D and Option E both are part of psychology.
You might be interested in
To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to th
Sergio [31]

Answer:

double arrow shape

Explanation:

To adjust the height of the cells

1. We have to position the mouse pointer over one of the column line or the one of the row line.

2. As we place the pointer between the dividing lines, the cursor of the mouse pointer change from singe bold arrow to double arrow symbol.

3.Now press or click the left mouse button and drag the dividing lines of the   cells to the desired position to have the required width or height of the cell.

5 0
4 years ago
_____ crime involves the use of computers and the internet to commit acts against people, property, public order, or morality. v
den301095 [7]
Hi,


Answer => Cyber


Good Lessons
6 0
4 years ago
Convert infix to postfix
kvv77 [185]

Answer:

static int checkSymbol(char ch)

{

switch (ch)

{

case '+':

case '-':

return 1;

case '*':

case '/':

return 2;

case '^':

return 3;

}

return -1;

}

static String convertInfixToPostfix(String expression)

{

String calculation = new String("");

Stack<Character> operands = new Stack<>();

Stack<Character> operators = new Stack<>();

 

for (int i = 0; i<expression.length(); ++i)

{

char c = expression.charAt(i);

if (Character.isLetterOrDigit(c))

operands.push(c);

else if (c == '(')

operators.push(c);

 

else if (c == ')')

{

while (!operators.isEmpty() && operators.peek() != '(')

operands.push(operators.pop());

 

if (!operators.isEmpty() && operators.peek() != '(')

return NULL;    

else

operators.pop();

}

else

{

while (!operators.isEmpty() && checkSymbol(c) <= checkSymbol(operators.peek()))

operands.push(operators.pop());

operators.push(c);

}

}

while (!operators.isEmpty())

operands.push(operators.pop());

while (!operands.isEmpty())

calculation+=operands.pop();

calculation=calculation.reverse();

return calculation;

}

Explanation:

  • Create the checkSymbol function to see what symbol is being passed to the stack.
  • Create the convertInfixToPostfix function that keeps track of the operands and the operators stack.
  • Use conditional statements to check whether the character being passed is a letter, digit, symbol or a bracket.
  • While the operators is  not empty, keep pushing the character to the operators stack.
  • At last reverse and return the calculation which has all the results.
4 0
3 years ago
Where is the video card located in a computer?
Rama09 [41]
Video card??????????
3 0
4 years ago
Read 2 more answers
I NEED RIGHT ANSWER
jolli1 [7]
1. First normal form:

The first step in normalisation is putting all repeated fields in separate files and assigning appropriate keys to them.

2. Second normal form:

In this stage of normalisation, all non-key elements that are fully specified by something other than the com­plete key are placed in a separate table. Normally, these non-key elements are dependent on only a part of a compound key.

3. Third normal form:

This stage of normalisation enables elimi­nating redundant data elements and tables that are subsets of other tables. The redundant elements are those non-key data elements that are placed in more than one table of the virtual data elements.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • _____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
    6·1 answer
  • Write a program that reads in two integers typed on the keyboard and outputs their sum, difference, and product.
    12·1 answer
  • In what year was the 1st zelda game released
    5·2 answers
  • Publishers that participate in a display ad network _____ a) get paid each time an advertiser is charged by the ad network for d
    7·1 answer
  • if you love games played on facebook, such as farmville, what might be your motivation for playing games
    13·1 answer
  • A student builds a model of her bedroom. The scale is 1:25. In the scale model, the students bed is 3 inches long. How long is t
    10·1 answer
  • Plz answer me will mark as brainliest​
    8·1 answer
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • A central issue of public sharing is:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!