1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
2 years ago
8

What techniques overcome resistance and improve the credibility of a product? Check all that apply.

Computers and Technology
1 answer:
horrorfan [7]2 years ago
3 0

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

You might be interested in
I WILL GIVE BRAINLIEST!<br> PLEASE HELP ME DUE!!!
Mandarinka [93]

Answer:

AX=B

Explanation:

6 0
3 years ago
Which of the following would be the least effective reference?
8090 [49]
The correct answer is your grandfather who would be a great business owner is: B
4 0
3 years ago
Read 2 more answers
list out the application of the computer and explain it?(and as the answer for this question as image) ​
amid [387]

Answer:

There are several applications of the computer; some of these applications are:

  • Word processors
  • Graphics applications
  • Web browsers
  • Gaming
  • Media players
  • Alarms and tasks schedulers
  • Etc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

<em>My explanation could not be submitted; so, I added it as an attachment.</em>

Download txt
3 0
3 years ago
Match each item with a statement below.â
MakcuM [25]

Answer:

a. Anycast Addresses

b. Broadcast domain

c. Classless Interdomain Routing (CIDR)

d. Extended Unique Identifier (EUI-64) interface ID

e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

f. IP prefix

g. Loopback Address

h. Metric

i. Multicasting

j. Teredo

Explanation:

a. <u>Anycast Addresses</u>: An address type used in IPv6 to allow a one-to-many relationship between source and destination.

b. <u>Broadcast domain</u>: The bounds of a network that defines which devices must receive a packet that's broadcast by any other device.

c. <u>Classless Interdomain Routing (CIDR)</u>: A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.

d. <u>Extended Unique Identifier (EUI-64) interface ID</u>: An auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.

e. <u>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</u>: An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.

f. <u>IP prefix</u>: A value used to express how many bits of an IP address are network ID bits.

g. <u>Loopback Address</u>: An address that always refers to the local computer. The loop address is primarily 127.0.01.

h. <u>Metric</u>: A value assigned to the gateway based on the speed of the interface used to access the gateway.

i. <u>Multicasting</u>: A network communication in which a packet is addressed so that more than one destination can receive it

j. <u>Teredo</u>: An automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers.

7 0
3 years ago
In class Assignment Setup of Production FacilityJobs Description Duration/ Weeks Predecessors1 Design production tooling 4 - 2 P
Zolol [24]

Answer:

See explaination

Explanation:

Critical path method (CPM) is a step-by-step process by which critical and non-critical tasks are defined so that time-frame problems and process bottlenecks are prevented.

please see attachment for the step by step solution of the given problem.

3 0
3 years ago
Other questions:
  • This question refers to a standard deck of playing cards. If you are unfamiliar with playing cards, there is an explanation in P
    10·2 answers
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • Using a personal computer to produce high quality printed documents
    8·1 answer
  • Plz help ASAP
    10·1 answer
  • A thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually und
    13·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • Help plzzzzzzzzzzzzzzzzzzzzzzzzz
    14·1 answer
  • Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evalua
    8·1 answer
  • Think about a career you would like to have 10 years from now.
    5·1 answer
  • How does Mixed Reality expand on Augmented Reality?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!