1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
12

When targeting customers of the consumer population at market a product, what type of segmentation information would be most hel

pful?
Computers and Technology
2 answers:
andrey2020 [161]3 years ago
7 0

Answer:

demographic information

Explanation:

denis23 [38]3 years ago
3 0

Suppose you are selling automotive detailing products. Is your target “anyone with money to pay for your product?” Or are you focusing your efforts on a tightly defined market segment of people with an identified need for what you are selling? “Anyone with money” is such a broad audience that it’s difficult to make any impact at all with your marketing efforts or convince very many people that they need your product.  If you narrow and carefully define your target market, though, your efforts will be more fruitful because they’re focused on people with a preexisting need or interest in what you offer.

You might be interested in
PLEASE HURRY
creativ13 [48]
I'm pretty sure it's C) or D) because it seems those make the most sense because providing excitement does not matter if that is not their point, repeating a previous point is practically useless because that point has already been said.
5 0
3 years ago
Read 2 more answers
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Machine code and Object code is the same right?​
guapka [62]

Answer:

"True" Machine code and Object code is the same.

Explanation:

All code at the same level is considered the same code, so we can say that the machine code, byte code, and the object code with it is of the same type, all of which are considered as the lowest level associated with the common program, these are common. Also known as source code because it is used in translating different languages.

6 0
3 years ago
In a linux script, the line ____ is important because it identifies the file as a script.
igor_vitrenko [27]
The closest line to that would be the first line:


#!/bin/bash

echo "Hello World!"


BTW, the "#!" is referred to as a she-bang. When those are the first characters executed, the (requires an absolute path) program that follows is launched, and the rest of this file is given to it as data. To run this like a program, the execute permissions need to be set ( chmod 0755 script.sh ).
8 0
2 years ago
Mention 5 advantages of internet​
alexira [117]

Answer:

1) We can get various types of information, knowledge.

2) We can communicate with each other no matter where they are if they have internet connection.

3) It can be used as a source of entertainment.

4) Through internet, we can work from home especially in this quarantine time.

5) Through internet, we can show our talent and skills.

Hope it helps :)

If you liked it, please mark this answer as the brainliest one.

4 0
3 years ago
Other questions:
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • I need this ASAP anyone pleas help me i have to do this by tonight
    10·1 answer
  • Online databases allow you access to material you may not be able to find when using popular search engines like Google. Select
    10·1 answer
  • Edhesive 3.2 Lesson Practice question 1
    5·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    13·1 answer
  • Define input hardware​
    12·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
  • Please help I will mark brainliest
    5·1 answer
  • What are some limitations when it comes to testing and ensuring program quality? List at
    15·1 answer
  • SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!