1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
7

​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data

to gain customer insights and gauge marketing performance.
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
7 0
I think it's value chain analysis.
You might be interested in
What is the primary difference between 3g and 4g cellular systems? 4g systems have greater transmission speeds. 3g systems are u
noname [10]
I believe the correct answer is the first option. The primary difference between 3g and 4g cellular systems would be that 4g systems have faster transmission as compared to 3g. The G would mean generation. The very difference of both is their speeds.
4 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
Phantasy [73]

Answer:

The program to this question as follows:

Program:

def lettersOnly(s): #defining method lettersOnly

   val="" #defining string variable that return value

   for i in s: #defining loop to calculate value

       if(i.isalpha()): #check condition that value is string

           val=val+ i #add value

   return val #return value

print(lettersOnly("data3base_ro1c3k5s")) #call method and print value

Output:

databaserocks

Explanation:

In the above python code, a method lettersOnly is declared that accepts a string variable  "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.

  • In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.    
  • At the last, the print method is used, which calls the lettersOnly method and prints its return value.
4 0
3 years ago
Does anyone know who this man issss?
devlian [24]

Kaeya Should be the correct answer

3 0
3 years ago
How do you comment on someone's answer on Brainly???
Semenov [28]
Press ANSWER , and reply
5 0
3 years ago
Other questions:
  • What is MARC? Discuss structure of MARC
    8·1 answer
  • When installing conduit for a mast service, what type of conduit should you use?
    9·2 answers
  • Which best describe a resource each student could use to find information
    6·2 answers
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • After correctly configuring a new wireless enabled thermostat to control the temperature of the company's meeting room, Joe, a n
    6·1 answer
  • WILL UPVOTE <3
    9·1 answer
  • A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
    10·1 answer
  • The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Tim Berners-Lee B. Bill Gates C. Robert Kahn D. Rober
    8·1 answer
  • Why bootable installer preparation is important? explain
    9·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!