1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
5

A burglar alarm company's advertisements show images of women's homes being broken into. What stereotype is promoted by these ad

vertisements?
A. that women are strong
B. that women are ignorant
C. that women are vulnerable
D. that women are courageous
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
5 0
C. that women are vulnerable
OLga [1]3 years ago
5 0
The Answer would be C. that women are vulnerable.
You might be interested in
What is the average value of a loyal customer (VLC) in a target market segment if the average purchase price is $75 per visit, t
anzhelika [568]

The value of loyal customers or VLC is derived by multiplying the values of the purchase price, contribution margin, repurchase frequency, and buyer's life cycle with each other.

<h3>How do you calculate a loyal customer's average value?</h3>
  • This number shows the amount of revenue your typical customer will likely provide to your company over the course of their dealings with you. Put into formula form: Customer value times typical customer longevity equals CLV. Using the equation: (P) (RF) (CM) = VLC (BLC) VLC = (75) (6) (10%) (1/0.25) VLC = $180.00 A loyal customer is worth an average of $180.00.
  • Loyalty-based segmentation gauges a customer's level of adherence to your brand, whether it is through participation in a rewards program, the volume of their purchases, or their overall engagement with your marketing initiatives.

VCL= 75*0.28

6*1/0.25=481,090.91

To learn more about value of a loyal customer refer to:

brainly.com/question/21306588

#SPJ1

5 0
1 year ago
Read 2 more answers
What's the best definition of financial literacy?
8090 [49]

Answer:

defines personal financial literacy as "the ability to use knowledge and skills to manage financial resources effectively for a lifetime of financial well-being.\

Explanation: thats it

5 0
3 years ago
ZigBee is an 802.15.4 specification intended to be simpler to implement, and to operate at lower data rates over unlicensed freq
never [62]

Answer:

True

Explanation:

Solution

ZigBee uses unlicensed frequency bands but operate at slower speed or data rates.

ZigBee: This communication is particular designed for control and sensor networks on IEEE 802.15.4 requirement for wireless personal area networks (WPANs), and it is a outcome from Zigbee alliance.

This communication level defines physical and  (MAC) which is refereed to as the Media Access Control layers to manage many devices at low-data rates.

6 0
4 years ago
Help me out-
olasank [31]

Answer:

1. Hard copy

Explanation:

It´s on an app so its a hard copy.

3 0
3 years ago
Read 2 more answers
Ada lovelace designed the first computer
muminat

Answer:      yes.                        

this was A very good question and after alot of digging up i finally found the answer by searching who was the first computer programmer on google :3

8 0
3 years ago
Other questions:
  • Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have alre
    8·2 answers
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? I need the answer ASAP Helping com
    14·2 answers
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • answer for brainliest Today, trending current events are often present on websites. Which of the following early developments in
    15·1 answer
  • Where can you go in QuickBooks Online to import a list of products and services? Select the Quick Create icon and under the Tool
    12·1 answer
  • Your program should first save 10 random numbers from 1-100 to an array called aray
    12·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • What tool can help discover and report computer errors when you first turn on a computer and before the operating system is laun
    9·2 answers
  • Question #1
    5·2 answers
  • Which of the following can be used to help find the error
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!