1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
3 years ago
7

Which statement draws an accurate comparison between social media marketing and conventional marketing? Social media marketing i

s more expensive than conventional marketing. Social media marketing is more labor intensive than conventional marketing. Social media marketing allows no feedback while conventional media marketing does. Social media allow customers to express their views while conventional media do not.
Computers and Technology
1 answer:
wlad13 [49]3 years ago
4 0
I think the best answer would be the last option.  Social media allow customers to express their views while conventional media do not. In social media, the viewers can freely right their comments and testimonials about a product. However, in conventional marketing like advertisements in televisions, the viewers cannot make direct comments to the company.
You might be interested in
What is a data broker?
AleksAgata [21]

Answer:

The correct option is a.

A business that collects personal information about consumers and sells that information to other organizations.

Explanation:

Data brokers, also known as data suppliers, data fetchers, information brokers, or even data providers are businesses or companies (even individuals) that, on the most basic level, source and aggregate data and information (mostly information that are meant to be confidential or that are in the real sense difficult to get) and then resell them to third parties. These third parties could be other data brokers.  

They collect data and information from a wide range of resources and sources - offline and/or online e.g web access history, bank details, credit card information, official records (such as birth and marriage certificates, driver's licenses).  

Brokers can steal round about any information. Examples of information that brokers legally or illegally steal are full name, residential address, marital status, age, gender, national identification number, bank verification number. Brokers and hackers are siblings.

A couple types of data brokers are:

1. Those for fraud detection

2. Those for risk mitigation  

Hope this helps!

6 0
3 years ago
What is the effect of this line of CSS code?
Semenov [28]
The correct answer is C
6 0
3 years ago
With _____ transmission, both parties in a global network are connected at the same time, as in a phone call
butalik [34]

Answer:

<u>synchronous</u>

Explanation:

During synchronous transmission parties are exchanging messages in real time.

5 0
2 years ago
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
solong [7]

Answer:

please find the attachment of the flowchart.

Explanation:

In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.

Please find the program and its output in the attached file.

8 0
3 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • The largest value (in hex) that can be loaded into Register A of HCS12 is (Points : 2) 0x8.
    9·1 answer
  • Some drive letters, such as the letter ____ that is typically used with the primary hard drive, are usually consistent from comp
    9·1 answer
  • Write a program named as calcPrice.c that formats product information entered by the user and calculate the total amount of purc
    5·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Describe the different
    12·1 answer
  • Refer to the image on the right. Then, using the drop-down menu, identify the correct printer type. A: inexpensive home printer
    10·1 answer
  • Simple interest will always pay more interest than compound interest.
    14·1 answer
  • what is one category of software mentioned in the unit materials as being example of groupware English technical
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!