1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
2 years ago
15

Write a brief, two-page paper describing how your lifestyle and values impact your use of the Web for e-commerce. How is your on

line consumer behavior affected by your lifestyle?
Computers and Technology
1 answer:
Harlamova29_29 [7]2 years ago
3 0

Answer:

My online consumer behavior is totally affected by my lifestyle.

Explanation:

<em>Nowadays social media is more than apps and instagram's feed. It is a pool of opportunities to make emotional connections with the product before the purchase.  Now I am able to experience and share the shopping experience with my friends. We do not have to go to the mall, we share the links and everyone can be part of it.</em>

<em>The social network watches and analyzes my behavior online and gather all the necessary information to redirect all of the merchandise related to my work, network, eating habits, likes, coments,  trips, concerts, pages and celebrities that I follow or look it up online.</em>

<em>This database about my lifestyle,  allow the e-commerce to be even more personalized. The shopping and consuming become easier, because they are  based on my online habits. So,  the products more suitable for me arrive in my feed, email, stories all the time. </em>

<em>However, the purchase decision became a little bit difficult. Now, I surf lots of channels for the best deals. Before the e-commerce fever, I used to go to my favorite shoe store and buy a pair of sandals, now I have them on my disposal everytime I get online. I can research for the best price, reveals, benefits, before I make the purchase.</em>

<em>And my lifestyle has changed too, now I can even buy groceries online. The saddest thing about the e-commerce revolution is that we are becoming isolated. I spent much more time indoors than outside hanging out with people and creating real connections.</em>

<em></em>

You might be interested in
Select the correct answer.
ratelena [41]

C i think is the right

8 0
3 years ago
Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
rjkz [21]

Specialized data analysts are needed for data mining in order to ask ad hoc inquiries and swiftly get responses from the system. choose one. This claim is false.

<h3>What does data mining mean exactly?</h3>
  • Large data sets are sorted through in data mining in order to find patterns and relationships that may be used in data analysis to assist solve business challenges.
  • Enterprises can forecast future trends and make more educated business decisions thanks to data mining techniques and technologies.
  • Increasingly huge databases are explored via data mining, which also helps market segmentation.
  • It is feasible to predict a customer's behavior to guide personalized loyalty marketing by analyzing the links between criteria like their age, gender, and preferences.

To learn more about Data mining, refer to:

brainly.com/question/2596411

#SPJ4

5 0
1 year ago
What finger should be on the Y key?
geniusboy [140]

Answer:

Right index

Explanation:

6 0
3 years ago
Read 2 more answers
The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
Svetllana [295]

Answer: b

The computer virus is simply a ___

b. Set of computer instructions or code

4 0
2 years ago
Which of the following is true of two-factor authentication?
dybincka [34]

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

7 0
3 years ago
Other questions:
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • Because you do not know every possible future use for the data TerramEarth collects, you have decided to build a system that cap
    15·1 answer
  • The concept of vertical farming allows agriculture to occur when there is not enough___Available .
    13·1 answer
  • Select all that apply.
    15·2 answers
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • Bullets in a text box will do which of the following?
    9·2 answers
  • List at least 5 professions for people working in the Information/Communication<br> fields.
    10·1 answer
  • Please answer it’s timed
    11·1 answer
  • What is the first things u do upon seeing this sheet?​
    14·2 answers
  • Merging refers to dividing a single cell into multiple cells. *TrueFalse
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!