1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
6

the two main ways in which marketers address the competition with their strategies are by satisfying a need better than a compet

ition and by
Computers and Technology
2 answers:
PtichkaEL [24]3 years ago
7 0

Answer:

offering a lower price

Explanation:

i just took this test lol

Nonamiya [84]3 years ago
4 0

Offering a lower price (Apex)

You might be interested in
What is the post condition of an expression or variable
Jet001 [13]

Answer:

The post condition is simply a statement expressing what work has been accomplished by the function. This work might involve reading or writing data, changing the values of variable parameters, or other actions.

8 0
3 years ago
Compute the bitwise XOR between 10010100 and 11101010.
Contact [7]

Answer:

The resultants bits for two strings are 0111 1110

Explanation:

Given details:

two pair of strings are

10010100

11101010

comparing two pair of strings, then perform XOR operation

Rules to follow for XOR

If both the bits are same then resultant is zero 0 and if bits are different resultant is one

XOR operation:

10010100

11 1 01010

-------------

01111110

The resultants bits for two strings are 0111 1110

8 0
3 years ago
List any two different between primary memory and secondary memory.​
nikitadnepr [17]

Answer:

Primary memory is directly accessible by Processor/CPU. Secondary memory is not directly accessible by the CPU. ... The memory devices used for primary memory are semiconductor memories. The secondary memory devices are magnetic and optical memories

3 0
3 years ago
Read 2 more answers
Develop Swimlane Activity diagram for Assignment announcement and submission system.
ArbitrLikvidat [17]
  • Using cases can be visualized in greater detail in this report of an activity diagram.
  • In other words, it's a behavioral diagram that regulates the number of actions via systems. They can also be used to show sequences of activities in business operations.
  • UML Activity Diagrams A business process can be examined to determine its flow and demands that use these tools.

The steps to this question can be defined as follows:

For step 1:

  • The task is to decide the action steps depending upon your use case.

For step 2: Identify all parties involved

  • If you know whoever the actors are, it's easier to determine the acts they are liable for.

For step 3: Establish a movement among activities

  • Change the priority in which the action is required by studying the flowchart.
  • If you need to add any branches to the graph, note the conditions that must be met for certain processes to take place.
  • Furthermore, do you even have to finish some tasks before moving onto someone else?

For step 4: Adding swimlanes

  • We know who is to blame for each act. It's time to assign everyone a swimming lane and group every action they are accountable for under it.
  • Some many activities and actions make up your sales system or process.

Please find the diagram in the attachment file.

Learn more:

Assignment submission: brainly.com/question/11714037

8 0
3 years ago
Jacob is a teacher and wants to sort his grades based on Test 1 and then on Test 2.
Pachacha [2.7K]
<span>He would click on the Test 1 column and press Sort, then click on the Test 2 column and press Sort. 
 It depends on what you learn because it says "shift"</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Mass production usually uses an _______________ ____________ or production line technique.
    7·1 answer
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Discuss anomaly detection.
    5·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • Which snippet of code is in XML?
    5·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Define Agricultural Era
    14·2 answers
  • Can someone please help me answer the extension activity and the exit ticket. I’ll award you. Thanks❤️.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!