1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
10

Which model works on the idea that advertising motivates people to think about the message, feel something about the product, an

d do something, such as try it or buy it? a.AIDA model b. basic communication model c.Facets model d.think-feel-do model e.feel-do-think mode
Computers and Technology
1 answer:
Ganezh [65]3 years ago
7 0

Answer:

D. Think-Feel-Do Model

Explanation:

The Think-Feel-Do Model or simply just TFD model is a marketing model used by marketers to engage their target customers.

THINK - Involves the marketers having an insights into the target customer's needs that are important.

FEEL - Understanding the target customers basic drive. It involves inbound and outbound marketing communications.

DO - This involves the creation of marketing materials to be used in targeting the target customers for the products/services.

You might be interested in
How would you determine if your earned credits would transfer to a regionally accredited school?
rodikova [14]

Answer:

D hope this helped - Willow

8 0
3 years ago
Read 2 more answers
List the steps you took to configure SERVERC and take a screen shot of the Connect to DNS Server dialog box by pressing Alt+Prt
Oksi-84 [34.3K]

Answer: Main Steps are as under;

1. Add servers to the server administrator • On the SVR-MBR-C computer, click All Servers.

2. After installation right click all servers icon, the SVR-MBR-C restarts.

3. On the Active tab and the selected Adatum domain, click Find Now Select the SVR-DC-A server and click the arrow and Search results. The server appears in the selected list.

4. In SVR-MBR-C, in Server Manager, click Manage> Add Roles and Features.

5. The Add Roles and Features Wizard appears, showing before you begin

6. Add AD DS as Roles.

7. 7. Promote the server after adding roles to a domain controller

8. After installation SVR-MBR-C restarts.

Explanation:

Main Steps are as under;

1. Add servers to the server administrator • On the SVR-MBR-C computer, click All Servers.

2. After installation right click all servers icon, the SVR-MBR-C restarts.

3. On the Active tab and the selected Adatum domain, click Find Now Select the SVR-DC-A server and click the arrow and Search results. The server appears in the selected list.

4. In SVR-MBR-C, in Server Manager, click Manage> Add Roles and Features.

5. The Add Roles and Features Wizard appears, showing before you begin

6. Add AD DS as Roles.

7. 7. Promote the server after adding roles to a domain controller

8. After installation SVR-MBR-C restarts.

6 0
4 years ago
Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
erica [24]
Consensus Building is NOT a technique that you can use to help you in identifying a problem.
8 0
3 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
Help ASAP please ?
mylen [45]
Okay, so since I don't completely understand your question, I'll just try my best to explain each of them.

1. Someone can find your location based on a photo that you posted; If you tagged the location, obviously they can find the location. If you put in the caption where you were when you took the photo, again yes, they would be able to find the location. If you were in a well known location when you took the picture and you can clearly see the background or the setting, with context clues you can figure it out, but as far as the social media platform telling the public where the picture was taken or posted, it is not authorized to give out the location.

2. Colleges use social media during the admission process; Some colleges do check the social media, not all but some. Mostly the platforms where you are most careless, so watch out. You can decide if you want your account to be public or private in the account settings.

3. items posted online can be removed at anytime; yes it can be removed, but depending on how popular the post was, people will still remember it.

4. Things you post online become public information; yes and no. On any and all social media platforms, there is a setting where you can choose the audiences the post reaches. There is the public setting where it's completely public and out into the world, there is the privacy setting where you are the only one who can view it, there is the friends setting where your friends can view your posts, and on some there are the friends/followers except... where you can choose specific people that can't view your post/s, and finally there is the specific friends that can view the post. You can also decide if you want your account in general to be public or private, which you can go into the settings and decide.

5. Employers screen job candidates based on social medias; like number 2 up there, some employers do check your social medias, but if you have you account settings as private they will have to request access.

I hope I helped at least a little! If I didn't i'm sorry i didn't completely understand the question so I tried my best.
If I did help, I'd appreciate it if you would give me brainliest! Thank you!
5 0
3 years ago
Read 2 more answers
Other questions:
  • Obtain the 10’s complement of the following six-digit decimal numbers:<br><br> 123900<br><br> 980657
    10·1 answer
  • Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says
    11·1 answer
  • Which of these should most likely be included in a wire frame ?
    12·1 answer
  • Write a function that finds the number of occurrences of a specified character in the string using the following header: def cou
    9·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • I have to writea piece of code to calculate the factorial of somewhat large numbers so the long long type won't suffize, so usin
    7·1 answer
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of
    14·1 answer
  • Write an algorithm to sum all numbers between 0 and 1000 that are divisible by ,7​
    8·1 answer
  • Is this very epik or not?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!