1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
10

Which technology do online storesusually use to present customized content?

Computers and Technology
1 answer:
k0ka [10]3 years ago
8 0

Answer:

real time analytics technology

Explanation:

Online stores usually use real-time analytics technology to present customized content. Explanation: Real-time analytics is gaining popularity nowadays. It is basically the procedure of measuring and preparing the data as it enters the database

You might be interested in
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Which of the following types of networks encrypts data for transmitting over
vova2212 [387]

Answer:a

Explanation:

3 0
3 years ago
Aisha designed a web site for her school FBLA club and tested it to see how well it would resize on different systems and device
VARVARA [1.3K]

Answer: responsive

Explanation:

its called mobile responsivness and most good websites have it

5 0
2 years ago
What medium allows for electronic delivery of DTP content without the need for any physical media?
Lostsunrise [7]
Email? Dropbox?...Not sure give one of these a try? Hope this helps
0 0
3 years ago
Assume we have a two-class learning problem where the labeled data consists of 1,000 data points from one class, and 10 data poi
lakkis [162]

Answer:

I don't know

Explanation:

please just thank me I need the points

4 0
4 years ago
Other questions:
  • Which of the following are potential drawbacks to the Internet in regard to politics? Select all that apply. Overexposure of can
    10·2 answers
  • A range of cells can be converted into an Excel ________ so that the data can be analyzed
    7·1 answer
  • Which is not the option applicable to the technology reference framework for advanced countries?
    11·1 answer
  • To alter just one character in a StringBuilder, you can use the ____ method, which allows you to change a character at a specifi
    5·2 answers
  • ​Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She
    10·1 answer
  • Define foreign key. What is this concept used for?
    6·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • Um ok that makes sooo much sence
    11·2 answers
  • Create the HTML code for this
    14·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!