1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
4 years ago
5

Cooper Technologies is a technology company that offers many IT services in Chicago. The company's services and products include

computer training, support, monitoring, repair, network design, virus removal, and software upgrades. It even sells refurbished computers. The source of Cooper Technologies' strategic position is
Computers and Technology
1 answer:
natima [27]4 years ago
5 0

Answer: Broad needs and many customers.

Explanation:

Broad needs along with many customers is the strategic position technique in which customers are served with the service and product through a certain channel and ways.It is used for fulfilling the numerous needs of customers in a way that other competing companies cannot serve.

  • According to the question,Cooper technologies is using broad needs and many customers strategic positioning to serve its various customers with services like repair, computer training,tracking etc.
  • Thus, they are handling numerous needs of their many customers.
You might be interested in
Choose the word pair that would best complete this analogy <br> annihilation : obliteration
iogann1982 [59]
Annihilation : obliteration

if the choices were:

strategy : tactics
sensation : numbness
deliberation : impulsiveness
endeavor : quit 

Then the word pair that would best complete the analogy is:
STRATEGY : TACTICS

Annihilation and obliteration are synonymous. In fact, annihilation is defined as complete destruction or complete obliteration. Obliteration is defined as total destruction.

Strategy and tactics are also synonymous. They both mean a system or mode of procedure or a plan of action.

The rest of the choices are antonyms.
8 0
3 years ago
An anchor tag can be coded using which two attributes? HELP ME PLEASE!!!!
Mashcka [7]

Answer:

option 1

Explanation:

href tag:- It gives the url of the destination where the link is forwarded to. It ia clickable portion of text.

name tag:- It defines the name of anchor.

5 0
4 years ago
Read 2 more answers
Ashton assigned a string value to a variable. Which program statement should he use?
m_a_m_a [10]

Answer: c because there cant be numbers or simboles also nooooooo spaces

Explanation:

brainlyist plz

6 0
3 years ago
Which value can be entered to cause the following code segment to display the message "That number is acceptable."
AnnZ [28]

Answer:

We can give the any  integer value between 10 to 100 then it display the message "That number is acceptable."

Explanation:

In the given code the "number" variable takes an user input via cin .After taking user input it check the condition of if block that the user input is between the range of 10 to 100 .if this condition is true then the statement of if block will be executed i.e  That number is acceptable otherwise else block will be executed That number is not acceptable.

following are the code in c++

#include <iostream> // header file

using namespace std;

int main() // main

{  

   int number; // variable

cin >> number; // taking input

if (number > 10 && number < 100) // if block

cout << "That number is acceptable.";

else

cout << "That number is not acceptable.";

return 0;

}

Output:

66

That number is acceptable.

456

That number is not acceptable.

8 0
4 years ago
What is the datapath of add instruction?
alina1380 [7]

i dont have enough information to awnser this

6 0
3 years ago
Other questions:
  • An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
    12·1 answer
  • Enables you to navigate through pieces of information by using links which connect them.
    10·1 answer
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • Which is an example of a tertiary source?
    13·1 answer
  • Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time.
    6·1 answer
  • What is the output of the following code:
    12·1 answer
  • How does our behavior change when we know we're being watched?
    14·1 answer
  • Está dentro del gabinete del CPU es electrónica y hace que la transferencia de datos se realice contra gran rapidez / ayuda vien
    6·1 answer
  • 1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!