1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
6

AMSCO networks plans to conduct a poll of viewers during the SuperBowl. They will conduct analysis to determine which area of th

e country they should target to maximize their retail broadband sales vs their business wifi sales. Which classification best describes this type of analysis?
a. Predictive Analytics
b. Descriptive Analytics
c. Prescriptive Analytics
d. Clustering
Computers and Technology
2 answers:
nexus9112 [7]3 years ago
6 0

Answer:

C. Prescriptive Analytics

Explanation:

Predictive Analytics is the analysis that give us the information of what could happen based on the research/analysis carried out.

Descriptive Analytics is the analysis that give us the information of what has happened based on the research/analysis carried out.

Prescriptive Analysis is the analysis that tell us what we should do based on the research/analysis carried out.

Clustering involve grouping of data into group called clusters.

Mandarinka [93]3 years ago
4 0

Answer:

c. Prescriptive Analytics

Explanation:

Data analytics is an important skill today in making business decisions. It requires the use of large data collections, to determine the output or narrate business events for better decision making. There are three types and stages of data analytics and they are descriptive, predictive and prescriptive analytics.

Descriptive analytics is the first stage of data analytics, it analyses historic data to describe the output relative to output values. Predictive uses the described output to give a certain futuristic output, while prescriptive analytics uses both predictive and descriptive analytics to prescribe the best solution or decision for maximum beneficial result.

You might be interested in
It was field day for the upper grades at Rock Creek School,
Mariulka [41]

Answer:

its c

Explanation:

8 0
3 years ago
Briefly explain what is net neutrality and why is it important today
ICE Princess25 [194]

Net neutrality also means that ISPs can't charge users access fees for particular websites. ... The goal of net neutrality is to ensure that businesses can compete freely on the internet without having to pay gatekeeper tolls. Without it consumers would look more like advertising segments than an open marketplace.

Credits: thestreet.com

6 0
3 years ago
16.
dimaraw [331]
  • Answer:

<em>r = 15 cm</em>

  • Explanation:

<em>formula</em>

<em>V = πr²×h/3</em>

<em>replace</em>

<em>4950 = 22/7×r²×21/3</em>

<em>4950 = 22/7×r²×7</em>

<em>4950 = 22×r²</em>

<em>r² = 4950/22</em>

<em>r² = 225</em>

<em>r = √225</em>

<em>r = √15²</em>

<em>r = 15 cm</em>

3 0
3 years ago
The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
ad-work [718]

Answer:

Yes, this statement is completely true

Explanation:

Yes, this statement is completely true. A personal computer is a multimedia machine and can be used to complete an incredibly large number of tasks with ease. Such tasks include all of the ones listed in the question. Aside from that other tasks depend more on the skill level and understanding of the user. For example, an individual who has a vast understanding of technology and programming can create software to perform absolutely any task they may want or need to do.

5 0
3 years ago
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Other questions:
  • Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration
    6·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • Help please?
    10·1 answer
  • Evidence that Social media hasn’t improved human communication.
    12·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • A network monitor records the following information while recording a network connection.
    9·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • Custom actions help your users by
    6·1 answer
  • Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in th
    7·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!