Importance of information technology in marketing​

Answers

Answer 1
Answer:

Answer:

it helps u to convey it to more ppl by using by means of mass of communication which helps it

Answer 2
Answer: Customer service has improved.

Related Questions

_ is an important management tool that is used to monitor and manage that contract and/or project
Consider the following class definition.public class Tester{privtae int num1;private int num2;/missing constructor /}The following statement appears in a method in a class other than Tester. It is intended t o create a new Tester object t with its attributes set to 10 and 20.Tester t = new Tester(10,20);Which can be used to replace / missing constructor / so that the object t is correctly created?
What effects convert colors in a picture to a wide variety of hues?
Write an application that calculates and displays the amount of money a user would have if his/her money could be invested at 5% interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation and return the result to be displayed. Save the program as Interest.java
What is not recyclable in ahybrid carhydrogen carpetrol car

What did networks of the 1960s use to connect computers?telephone lines

wireless technology

television signals

telegraph cables

Answers

Answer:

Explanation:

Telephone lines

A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.a. Battery backup

b. Surge suppressor

c. CRT

d. UPS

Answers

Answer: A) Battery backup

Explanation:

 A battery backup are used to provide the source of power backup to various hardware components and desktop computers. In many cases, the devices are plugged into UPS ( uninterruptible power supply) for backup power and it is also depend upon the size of the UPS.

All the battery backups are located inside so that is why, the devices are heavy in weight. Usually, the battery backup front required additional button for performing various functions.

And the battery backup devices are manufacture by using the varying degree of backup abilities.

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

In dealing with facial recognition technology, what term describes the rate at which imposters are recognized as legitimate users?

Answers

Answer:

CER

Explanation:

The CER refers to equanimity between an identification technology's False Acceptance Rate and its False Rejection Rate, which is “the best summary measure of face recognition technologies' efficacy,” according to a statement from Applied Recognition.

One advantage of the Second generation of programming language is that it is machine dependent. True or False

Answers

Answer:

I THINK FALSE

Explanation:

_________ help(s) prevent a person from being a single point of failure.

Answers

Answer:

Internet access

Explanation:

Answer:

The correct word for the blank space is: Access controls.

Explanation:

Access controls regulate who has access to sensitive information in a company. Access controls can be physical -grant access to data centers, restricted rooms or buildings- and virtual -grant access to servers, networks or certain types of files or data.