1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
14

​Coca-cola has developed a video ad campaign that encompasses several different viewing platforms including​ tv, digital,​ mobil

e, and social media. what is this approach that combines and integrates multiple media​ options?
Computers and Technology
1 answer:
SOVA2 [1]3 years ago
7 0
Integrated Marketing Communications is an approach that connects or linked all types of communication to be used in campaigning a product. So, coca cola has developed a video ad campaign that encompasses several different viewing platforms including tv, digital, mobile, and social media, this example shows that using the IMC approach you can integrate all promotional tools for a product.
You might be interested in
Which of the following software programs provides for e-mail communication?. A. Access. B. Word Perfect. C. Outlook. D. Excel
torisob [31]

There are several software programs and internet applications that you use to send electronic mail (e-mail) to other people. However, for programs that are part of the Microsoft Suite, only one provides this ability, which is (C) Outlook.  

Microsoft Access is used to manage databases, while Microsoft Excel is used to analyze numerical and text data. WordPerfect is a word processor software created by Corel.  


5 0
3 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
A point is named by a lowercase letter. <br> a. True<br> b. False
Alik [6]
That is B False m8 that means mate btw xD please say thank you :P
4 0
3 years ago
Read 2 more answers
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.
maksim [4K]

Answer:

Replace the first blank with:

message = "Hello " + name + ". Your lucky number is " + str(number)

Replace the second blank with:

return message

Explanation:

The first blank needs to be filled with a variable; we can make use of any variable name as long as it follows the variable naming convention.

Having said that, I decided to make use of variable name "message", without the quotes

The next blank is meant to return the variable on the previous line;

Since the variable that was used is message, the next blank will be "return message", without the quotes

3 0
4 years ago
Other questions:
  • Consider the pseudo-cpu discussed in class. the instruction format is 16 bits, which is subdivided into 4-bit opcode field and 1
    14·1 answer
  • P**nhub or x-videos or other
    9·1 answer
  • What is a gutter margin?
    5·2 answers
  • Describe the role of the microprocessor in an automatic washing<br> machine (IGCSE)
    10·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • HELP FOR JAVASCRIPT: 01. What is prototypical inheritance? 02. How can JavaScript be used to improve accessibility on the web? I
    6·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • When you press the ____ key without entering any text after the automatic bullet character, Word turns off the automatic bullets
    11·1 answer
  • Complete the following sentence.
    7·1 answer
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!