1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
13

Item 8 Item 8 Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive

and negative customer reviews into her computer system. What type of information is Shelby gathering?
Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
8 0

Answer: Feedback

Explanation: Feedback is the reaction obtained in the form of information from the task a person has performed or any product. It gives the review of the service that is given by the customer, user etc.The reaction that is obtained can be a negative feedback or positive feedback.

Both types of feedback is necessary because it helps in the improvement of the service. The negative reaction will helps to change/improve the service that is not liked by the customer and positive feedback tells about the services appreciated by the customer. So, Shelby is also keeping the feedbacks for the same purpose for her salon business.

You might be interested in
Discuss the benefits of a system safety effort other than improved safety
klio [65]

Answer: Safety effort of system is defines as the measures that are taken to provide and maintain the protection of the system.There are several methods ,tool and efforts made for the system security .Benefits of the system security are as follows:-

  • Takes control over the hazardous situation and maintain the security
  • System security will also increase the development of the system easily.
  • Approach towards the analyzing of the system function
  • Data, information and functions are safe from being detected in unauthorized way.
  • Functions and implementation is made easy without the fear of getting attacked or hacked.

8 0
3 years ago
Inc AX,2 is valid in assembly language ?
masya89 [10]

Answer:

in most so yes

Explanation:

4 0
3 years ago
In two to three sentences, describe one advanced search strategy and how it is useful.
Lerok [7]
A search stagey is useful because you can make complicated searches easily and also get reliable data.
6 0
3 years ago
Which of the following will not cause the supply of internet service to increase?
Rus_ich [418]

Answer:

c

Explanation:

5 0
3 years ago
Setting your __________ will prevent you from having to type your name in every email.
Kay [80]

I believe its D. Signature.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • By applying styles formats are being applied ?
    14·2 answers
  • Links to the four default folders can be found on the left side of the file explorer window under the _________ heading:
    5·2 answers
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • Extension: Cash Register Program
    12·1 answer
  • Use the drop-down menus to answer the questions.
    6·1 answer
  • Cómo se llaman los robots que se utilizan para la exploración espacial, en medicina, en la industria, en la agricultura, los que
    13·1 answer
  • Informed _________ will better manage complexities and enable more efficient manufacturing of goods.
    13·1 answer
  • Do software engineers save millions of dollars in usa
    6·1 answer
  • What makes a recipe for a meal an example of an algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!