1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
10

Att supermarket has collected a large amount of data regarding its customers. to understand customer purchase behavior, the comp

any uses a process that automatically identifies correlations in the collected data. through this process, the company learns that people who wait for more than 10 minutes in the billing queue, tend to remove a few items from their shopping cart. consequently, this leads to reduced sales. the manager of the supermarket decides to install five more billing counters, which could reduce the estimated wait time by a considerable amount. in this scenario, att supermarket has most likely used _____ to process information.
Business
1 answer:
andreev551 [17]3 years ago
3 0

Answer: A. data mining

Answer choices are:

A) data mining

B) data integration

C) barcoding

D) radio frequency tagging

Thru data mining, companies can analyze, learn more about their clients and develop more effective marketing strategies to increase sales.

Att supermarket used data mining. Thru a large amount of data they collected regarding their customers, they were able to understand customer purchase behavior, Through this process, the company learned that people who wait for more than 10 minutes in the billing queue, tend to remove a few items from their shopping cart, leading to reduced sales. The manager of the supermarket was then able to make a good decision to install five more billing counters, to reduce waiting time and prevent lost sales.

You might be interested in
Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager
Cloud [144]

Answer:  Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.

Explanation:

The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :

  • To manage information security risks to keep them at acceptable levels.
  • Protect information assets.
  • Train public servants, suppliers and stakeholders about the importance of data protection.
  • Monitor compliance with information security requirements.
  • Implement corrective and improvement actions.

Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.

The most common threats are :

  1. Unofficial applications. (Can ask you for permitions and steal your private information)
  2. Public WIFI.(Can enter in to your network and steal your private information)
  3. Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)

Always is important to protect the device with one or several of this advices:

  • Secure access networks.
  • Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
  • Write a security policy. Define which devices can access corporate information.
  • Protect WiFi connections.
  • Protect against malware.

In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.  

The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.

Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).

3 0
4 years ago
In order for a business to be really successful,
poizon [28]

it would be a as a team I hope this helps

3 0
2 years ago
Suppose the Federal Reserve releases a policy statement today which leads people to believe that the Fed will be enacting expans
bekas [8.4K]

Answer:

<h2>An expansionary monetary policy by the Federal Reserve would lead to an <u>increase </u> in the demand for US assets and a <u>depreciation</u> in the value of US dollars.Hence the correct answer is option D) or increase;depreciate.</h2>

Explanation:

An expansionary monetary policy commonly entails expansion of money supply thereby reducing the eventual interest rate in order to boost or stabilize the Aggregate Demand(AD) and overall output level or GDP in the economy.Now,as the domestic interest would fall in US due to the expansionary speculations and inflationary indications(increase in money supply),it would consequently lower the value of the US dollars relative to other foreign currencies.This implies that US dollar would depreciate compared to other foreign currencies.This possibility would encourage the importers and international investor or financiers to become more attracted towards the US goods,services and financial assets thereby increasing their demands.Therefore,a depreciation of US dollars would essentially lead to an increase in the demand for US assets in the international market as depreciation of US dollars would also lower the value of US assets in the international market.

3 0
3 years ago
Monsters Inc. will pay its first annual dividend of $2 per share exactly 4 years from today, and you expect its dividend to grow
Crank

Answer:

Fill in the blanks to make the following statements true. Also named the property used.  

a. (-5) + (-4) = ___ + (-5),

b. 4 + __ = 4,

c. - 53 + ___ = - 53,  

d. 4 + [(-5) + (7)] = [4 + (7)] + ___,

e. 25 + [(-50) + 5 ] = (25 + 5) + ___,

f. (-4) + ___ = -4,

g. 4 + (-4) = ___,

h. 5 + ___ = 0 ,

Explanation:

Fill in the blanks to make the following statements true. Also named the property used.  

a. (-5) + (-4) = ___ + (-5),

b. 4 + __ = 4,

c. - 53 + ___ = - 53,  

d. 4 + [(-5) + (7)] = [4 + (7)] + ___,

e. 25 + [(-50) + 5 ] = (25 + 5) + ___,

f. (-4) + ___ = -4,

g. 4 + (-4) = ___,

h. 5 + ___ = 0 ,

5 0
3 years ago
30points
koban [17]

Answer: C

Explanation:

8 0
3 years ago
Other questions:
  • Read the following scenario and answer the question in 5-10 sentences. You are an experienced small business owner who would lik
    5·1 answer
  • If a given investor believes that a stock’s expected return exceeds its required return, then the investor most likely believes
    7·1 answer
  • At Fantastic Flavors, a large regional chain of candy stores, employees from marketing, design, production, and finance departme
    11·1 answer
  • Telling part of the truth is an honest approach, especially when others are holding things back.
    9·1 answer
  • Each task in a systems development project should culminate in one or more ________.
    13·1 answer
  • Anybody wanna be my friend looking for some in delta co im in 8th grade
    6·2 answers
  • What two words are often associated with centrally planned economies?
    12·2 answers
  • Does the bank record when a check is cashed or written?
    13·1 answer
  • In a market there is a shortage of a good. What change would cause the market to come to an equilibrium?
    11·1 answer
  • if the firm sells its product at the market price of $10 per unit, the marginal revenue product of the fourth worker is
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!