1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
12

Which type of software is used for marketing research as a way to find out about users' preferences?

Computers and Technology
1 answer:
kogti [31]3 years ago
8 0

Answer:

Adware

Explanation:

It's software that displays advertisements to users and gauges their preferences

You might be interested in
Which type of image is not a supported using the online picture or insert picture command?
Anarel [89]

Answer:

thumbnail pane

Explanation:

just took the review for it

5 0
3 years ago
4.9 Code Practice: Question 4
RideAnS [48]

total = 0

i = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum = "+str(total))

I hope this helps!

6 0
3 years ago
Read 2 more answers
Why it is important for everyday people to have access to credible online information?
Citrus2011 [14]

Answer:

so you know what is true

Explanation:

5 0
4 years ago
Read 2 more answers
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Your manager has asked you to recommend which of two new types of digital camera to buy for your company's publications departme
Neporo4naja [7]

Answer:

Website

Explanation:

In the digital world that we are in right now, the best place to conduct your research is online. By click of a mouse, I will be able to go through an unlimited list of websites online, search for the best digital cameras out there, do a purchase, and have the cameras delivered at the comfort of my chair. There are tremendous resources online that will help me choose what is the best for the company.

3 0
3 years ago
Other questions:
  • Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
    14·1 answer
  • Is cloud computing a hardware service used to keep computers working? True or False
    11·1 answer
  • If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho
    15·2 answers
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it wa
    5·1 answer
  • If you have limited means, you...?
    9·1 answer
  • Besides entering a URL to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    9·1 answer
  • Your iphone is not configured to allow calls using this mac
    10·1 answer
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
  • A field value is currently not in any group. what happens when you try adding it to an existing group?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!