1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
4 years ago
7

Using tracking code, google analytics can report on data from which systems?

Computers and Technology
1 answer:
soldier1979 [14.2K]4 years ago
6 0
The correct answers are:
<span>E-commerce platformsMobile
Applications
Online point-of-sales systems
Source and explanation: https://goo.gl/guJKC9
</span>
You might be interested in
What tab should you choose if you want to practice presenting with your PowerPoint slides?
dezoksy [38]

Answer:

i think its slideshow tab

Explanation:

tell me if im right

6 0
3 years ago
Read 2 more answers
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that
andrey2020 [161]

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

6 0
3 years ago
Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants
GalinKa [24]

Answer:

b. Machine learning

Explanation:

The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.

5 0
3 years ago
What is the dark, sticky substance that forms when tobacco is burned?
sashaice [31]

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

7 0
3 years ago
Dr. Wisteria is a prominent chiropractor in the Chicago area. She wants to provide a forum for her patients to discuss their hea
Svet_ta [14]

The best-suited telecommunications tool for Dr. Wisteria is a blog.

a blog

<u>Explanation:</u>

A blog can be defined as an informational website and more a platform for exchanging views and ideas about a particular topic.

There are various blogging platforms available. Dr. Wisteria should start writing blogs about health issues and in this way, she would be able to interact with all the people accessing the blog. People can also post their queries about their health issues and Dr. Wisteria can always reply to them.

This would also create a lot of awareness about any particular health issue being discussed as it is not necessary that only those people who want to post something will access the blog post, it can always be accessed by anyone.

5 0
3 years ago
Read 2 more answers
Other questions:
  • . Hackers generally disguise their IP address. True False
    9·1 answer
  • What identifies available computers through the internet?
    14·1 answer
  • Does anyone know this page for drivers ed?
    9·1 answer
  • When a client computer wants to connect to a service instance, what specific name type does it use to find the service?
    9·1 answer
  • What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
    10·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • Computer C’s performance is 4 times as fast as the performance of computer B, which runs a given application in 28 seconds. How
    5·1 answer
  • How do you remove a key cap without a kaycap remover (keyboard keycap) ​
    11·1 answer
  • Write a short-essay discussing your own stand on social media usage for students.​
    5·1 answer
  • Windows 8 uses a(n) ________ account for easy access and storage of online files.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!