Answer:
Negative feedback that is addressed correctly can help build customer loyalty..
Analytics and other new technologies help developers evaluate feedback.
The feedback loop is not closed until action is taken to address the feedback.
Explanation:
Feedbacks are simply complaints, abuses, praise which service providers do get when customers allowed to respond or give commebts on the services rendered. It is an essential channel for consumers to channel Thor grievances and well as praise while also allowing service providers take adequate note of shortcomings and areas which could be improved upon in their products or service offering. Proper evaluation of feedbacks with regards to sensitivity and humor goes a long in molding good customer relationship and loyalty.
Prioritization of negative feedbacks by angry customers should be handled carefully and noted in other to proffer adequate fix and foster good future relationship.
Why are the READ and DATA statements used
together?
Explanation:
DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.
which cloud service model provides access to an application that is built, monitored, and offered by the cloud provider?
SaaS cloud service model provides access to an application that is built, monitored, and offered by the cloud provider.
What is cloud service?The term "cloud services" refers to a variety of IT tools and resources such as platforms, infrastructure, and software that are hosted by outside providers and made available to businesses and private individuals on demand over the internet. Therefore, the terms can be used interchangeably. They can also be referred to as cloud computing.
In order to achieve economies of scale, cloud services depend on resource sharing over the internet. Nine out of the top ten cloud service providers use Linux, making it the most popular operating system for cloud computing. It powers about 90% of the workload on public clouds.
Learn more about cloud services
https://brainly.com/question/29531817
#SPJ4
on a linux computer, what contains group memberships for the local system?
The computer networks and systems of a company are protected by security measures that are planned and implemented by information security experts.
The day-to-day management of computer networks is the responsibility of network and computer systems administrators. A 64-bit file system called XFS was initially shown in 1994 and has been a part of the Linux kernel since 2001. It is RedHat Linux's default file system. The largest file size supported by XFS is 8 EiB, while the filename length is limited to 255 bytes.
To do this, the file's inode has a link count that shows how many directory entries altogether refer to it. A file is only actually destroyed when the number of links to its inode is zero.
This team, also referred to as a "computer incident response team," is in charge of reacting to security lapses, viruses, and other potentially disastrous situations in businesses that confront high security risks.
Know more about computer networks here:
https://brainly.com/question/13992507
#SPJ4
Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is 6 years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?
Answer:
Upgrade
Explanation:
EDGE 2021
Answer:
B. Upgrade
Explanation:
Because you have a desktop, upgrading the CPU and RAM are an easy and inexpensive fix. Upgrading a laptop is more difficult and often requires purchasing a new computer.
I hope this helps<3
Have a nice day everyone<3
Question: An ILP problem has 5 binary decision variables. How many possible integer solutions are there to this problem? a. 5 b. 10 c. 25 d. 32.
The possible integer solutions to this problem are :
(d.) 32.
ILP stands for Integer Linear Programming, which is a method of optimization that entails finding the maximum or minimum of a linear objective function, subject to linear constraints where all the variables involved are limited to integers only.
A binary decision variable is one that can take one of two values: 0 or 1. Such variables are commonly used in optimization issues, particularly in mathematical optimization. Such variables are particularly useful in the production of logical statements, as well as decision-making processes.
Here, we are given that the ILP problem has 5 binary decision variables.
The number of possible solutions can be determined by calculating the total number of feasible solutions. The feasible solutions can be calculated as:
2 × 2 × 2 × 2 × 2 = 32
Thus, there are 32 possible integer solutions to the given problem. The answer is option d.
To learn more about ILP visit : https://brainly.com/question/27855584
#SPJ11
I need some help with this project. The picture of the assignment is above
Answer:
sorry
Explanation:
you need to do this on your own Wahhabi
but if you sub to my you-tube channel at chris got ha,x i will help you out
Check the devices that are external peripheral devices:
Answer:
Mouse, and keyboard
Explanation:
Common Sense
1.) Write the formula, which assigns double x to double n raised to the double z power.
.
2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.
.
3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)
.
4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:
double num1, num2
Answer:
1.) Write the formula, which assigns double x to double n raised to the double z power.
Answer: 2\times x → 2\times n^(2\times z)
2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.
Answer: 5\plus 2\times t^3→2\times x
3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)
Answer: 2\times x → \sqrt \{(l^2)_1 + (l^2)_2\}= hypotenuse
4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:
double num1, num2
Answer: length = \sqrt\{|num2 - num1\|} → 2\times x
Explanation:
\(.\)
Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.
A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.
What is a web resume?A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.
Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.
Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.
For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.
More about the web resume link is given below.
brainly.com/question/862477
Answer:
true
Explanation:
differences between word processor and typewriter
The differences between word processor and typewriter are given below:
Word Processor:Documents can be saved, printed, and shared electronically.
Multiple documents can be open simultaneously, and changes can be easily made and undone.
Word processors often include templates for various document types like resumes, letters, and reports.
Typewriter:A typewriter is a mechanical device used for writing and producing printed text on paper.
It uses individual keys for each character and requires manual effort to press the keys and produce text.
Typewriters offer limited formatting options, typically only allowing for basic text alignment and bold or underline options.
Corrections are more difficult on a typewriter, often requiring correction fluid or erasing and retyping.
Read more about word processors here:
https://brainly.com/question/29762855
#SPJ1
Distinguish between project buffers and feeder buffers.
What is each buffer type used to accomplish?
Project buffers and feeder buffers are two types of buffers used in project management. Project buffers are used to protect the project completion date, while feeder buffers are used to protect individual activities within the project.
Project buffers and feeder buffers are part of the Critical Chain Project Management (CCPM) methodology, which aims to improve project scheduling and delivery. A project buffer is a time buffer placed at the end of the project schedule. Its purpose is to protect the project completion date from potential delays and uncertainties. The project buffer absorbs any variations or delays that may occur in the project, providing a buffer of time to prevent the overall project timeline from being compromised.
On the other hand, feeder buffers are placed at the end of individual activities or chains of activities that feed into critical project paths. Feeder buffers protect specific activities or chains from disruptions or delays that could impact the overall project timeline. They provide a cushion of time to absorb any variations or uncertainties that may arise within those activities, ensuring that they do not cause delays to the critical path and ultimately the project completion. In summary, project buffers safeguard the project completion date, while feeder buffers protect specific activities or chains within the project. Both types of buffers are used to manage uncertainties, variability, and potential delays, ultimately aiming to improve project delivery and ensure timely completion.Learn more about CCPM here:
https://brainly.com/question/14528350
#SPJ11
name at least two actions that you might take if you were to see a large animal on the right shoulder of the road in front of you
Answer:
Explanation:
Scan the road ahead from shoulder to shoulder. If you see an animal on or near the road, slow down and pass carefully as they may suddenly bolt onto the road. Many areas of the province have animal crossing signs which warn drivers of the danger of large animals (such as moose, deer or cattle) crossing the roads
mark me brillianst
what is the first thing you should check if you discover that domain names are not resolving into ip addresses on a pc or workstation?
The first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation is the DNS server settings. DNS (Domain Name System) servers are responsible for resolving domain names into IP addresses, so if there is an issue with these settings, it can result in domain names not resolving into IP addresses.
To check the DNS server settings on a Windows PC, follow these steps:
Click the Windows Start button and select "Control Panel".Click "Network and Internet" and then "Network and Sharing Center".Click "Change adapter settings" on the left side of the window.Right-click on the network adapter you are using and select "Properties".Scroll down to "Internet Protocol Version 4 (TCP/IPv4)" and select it.Click the "Properties" button.Make sure that "Obtain DNS server address automatically" is selected. If it is not, select it and click "OK".If this does not resolve the issue, you may need to contact your network administrator or internet service provider for further assistance.
Learn more about DNS server: https://brainly.com/question/18274277
#SPJ11
Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School
Answer:
print("What year of high school are you in?")
grade = input()
grade = grade.lower()
if grade == "freshman":
print("You are in grade: 9")
elif grade == "sophomore":
print("You are in grade: 10")
elif grade == "junior":
print("You are in grade: 11")
elif grade == "senior":
print("You are in grade: 12")
else:
print("Not in high school")
Explanation:
The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.
grade.lower():
The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.
Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.
errors like segmentation fault, access violation or bad access are caused due to _____.
Errors like segmentation fault, access violation or bad access are caused due to various reasons. It could be caused due to a software bug, hardware defect, memory corruption, or stack overflow or some other reasons.
Each programming language has different reasons for the occurrence of these errors. For example, in C and C++ programming, the segmentation fault error occurs when a program tries to access a memory location that is out of bounds or is not allocated to that program.The access violation error occurs when a program attempts to read or write data from a memory location that is not allowed or doesn't have proper permissions. Similarly, the bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.Explained in 130 words:Errors like segmentation fault, access violation or bad access are caused due to various reasons, including software bugs, hardware defects, memory corruption, stack overflow or some other reasons. Each programming language has different reasons for the occurrence of these errors. In C and C++, segmentation fault occurs when a program tries to access a memory location that is out of bounds or not allocated to the program, while access violation occurs when a program tries to read or write data from a memory location that is not allowed or doesn't have proper permissions. The bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.
To know more about programming language visit:
brainly.com/question/23959041
#SPJ11
Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.
In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.
Why do you need to translate a program written in a high-level language into machine language?Programming languages are known to be easy for humans to read and understand.
Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.
Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.
Learn more about machine language from
https://brainly.com/question/23275071
#SPJ1
3.2.1.1 if statements checkpoint 4
An IF statement is a way to make decisions based on a condition.
What is an IF statement?
It has two possible outcomes: one for when the condition is true, and one for when it is false. For example, in Excel, you can use an IF statement to check if a cell value is “Yes” or “No” and return a different number accordingly. You can also combine IF statements with other functions like AND, OR and NOT to test multiple conditions2. Here is an example of an IF statement in Excel:
=IF(A1>10,“Large”,“Small”)
This formula checks if the value in cell A1 is greater than 10. If it is, it returns “Large”. If not, it returns “Small”. This is how you can use an IF statement to control the flow of your program or spreadsheet based on a logical test.
To learn more about IF statement, visit: https://brainly.com/question/30751419
#SPJ1
What does your car driver look like? Answer the following question.
1. How many minutes do you drive every day?
2. How long do you travel every day?
3. What trips could you make in any other way?
4. What are the risks / dangers of traveling by car?
Answer:
42 miami to pakistan
Explanation: buy
why organization keep documents in word format and publish them in pdf format?
Organizations keep documents in Word format and publish them in PDF format because of the following reasons: Reasons to keep documents in Word format1. Easy to edit: Word documents are designed to be edited. They can be opened, edited, and saved with ease.2.
Formatting: Word documents offer a wide range of formatting options. The formatting options are easier to use than in other formats.3. Collaboration: Word documents can be shared and edited by many people. Multiple authors can work on the document simultaneously. Reasons to publish documents in PDF format1. Preserves formatting: PDF documents preserve the formatting of the original document.
They are designed to ensure that the document appears the same regardless of the device it is viewed on.2. Security: PDF documents can be secured by password or digital signature. This ensures that the document is not altered by unauthorized people.3. Size: PDF documents are smaller in size compared to Word documents. This makes them easier to transfer over the internet.
Learn more about Word format at https://brainly.com/question/31983788
#SPJ11
name two components required for wireless networking
(answer fastly)
Explanation:
User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...
Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.
or routers, repeaters, and access points
Telecommunications, Bridges, Power and energy, combine them to form one sentece
The combined sentence is given below
In the world today, the use of Telecommunications is acting as Bridges between the old and the new, there are new innovations in the are of Power and energy,
Describe what telecommunication is?Information is transmitted electronically over distances through telecommunications. The data could take the shape of voice calls, data, text, photos, or video. These days, telecommunications are utilized to connect relatively far-flung computer systems into networks.
Therefore, one can say that by altering sentence structure, sentence combining "smooths out" rough writing and makes a piece of writing more interesting for the reader. Simply connecting words with a conjunction such as seen above.
Learn more about Telecommunications from
https://brainly.com/question/26152499
#SPJ1
which methodology provides a framework for breaking down the development of software into four gates?
Answer:
RUP
Explanation:
many countries restrict the use or exportation of cryptographic systems. what is the reason given when these types of restrictions are put into place?
Although the U.S. government has significantly decreased its prohibitions on the export of cryptography, some still exist. Any nation that the United States has designated as aiding terrorism is prohibited from purchasing products that use encryption. The worry is that the government won't be able to crack the encryption used by the country's enemies to hide their communications and track their data transfers.
What is Encryption?
The process of converting information into a secret code that conceals its true meaning is known as encryption. Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.
The science and art of changing signals to make them secure and impervious to attackers is known as cryptography. It is a technique for keeping and sending data in a specific format that only the intended audience can read and process. Cryptography can be used for user authentication in addition to safeguarding data against theft and modification.
Learn more about Cryptography click here:
https://brainly.com/question/88001
#SPJ4
1. A type of drawing used to represent the exact size and shape of an object having inclined surfaces. a. audiary drawing c. sectional drawing d perspective drawing
Answer:
Auxiliary drawing
Explanation:
which of the following is one of the most primary maintenance steps for software? a. saving all of your files on a flash drive b. closing windows that you are no longer using c. keeping software programs up-to-date d. turning your computer off each time it freezes
The most primary maintenance step for software is c) keeping software programs up-to-date. The correct option is option c.
The maintenance of software is important to ensure its proper functioning and longevity. There are various steps that one can take to maintain software. Among the options given, keeping software programs up-to-date is one of the most primary maintenance steps for software. Updating software ensures that any bugs or security issues are fixed, and new features are added. It also helps in optimizing the performance of the software. In conclusion, to maintain software properly, it is important to keep it up-to-date. This can be done by regularly checking for updates and installing them as soon as they are available.
To learn more about software, visit:
https://brainly.com/question/32237513
#SPJ11
When would you use an omnidirectional microphone?
when there are three or more actors in a scene
when it is a windy day and you want to reduce the sound of the wind in the recording
when you want to get outdoor sounds that relate to an outdoor scene in a film
when you want to record in surround sound
Answer:
when it is a windy day and you want to reduce the sound of the wind in the recording
a. Mohit has bought a new laptop. The laptop is not working as no software is installed in
Which software should be installed first to make his laptop start working?
The windows software should be installed first to make his laptop start working.
What is the Microsoft Windows?This is known to be the Operating system and it is one that is said to be made up of a group of a lot of proprietary graphical operating system families made and marketed by Microsoft.
Note that the windows comes in different version such as:
Windows 11windows 10windows 8windows 7, etc.Therefore, for your laptop to start, it need to have one of the windows written above.
The windows software should be installed first to make his laptop start working. and by installing the windows be it windows 10, 8, 7, etc., it will start working.
Learn more about software from
https://brainly.com/question/1538272
#SPJ1
which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?
type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities Reconnaissance
What occurs during reconnaissance?Reconnaissance is the act of gathering information about a target prior to launching an attack. Reconnaissance is performed to identify weaknesses, vulnerabilities, holes, activity, and nodes that attackers can use to target an organisation.
What exactly is active reconnaissance?An active reconnaissance computer attack is one in which an intruder interacts with the targeted system to gather information about vulnerabilities. The term reconnaissance comes from the military, where it refers to a mission into enemy territory to gather intelligence
What exactly is reconnaissance research?The reconnaissance survey is a thorough examination of an entire area that could be used for a road or an airfield. Its goal is to identify the more promising routes or sites while eliminating those that are impractical or unfeasible. Existing maps and aerial photographs may be extremely useful.
learn more about reconnaissance visit:
https://brainly.in/question/3978541
#SPJ4
type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities Reconnaissance
What occurs during reconnaissance?Reconnaissance is the act of gathering information about a target prior to launching an attack. Reconnaissance is performed to identify weaknesses, vulnerabilities, holes, activity, and nodes that attackers can use to target an organisation.
What exactly is active reconnaissance?An active reconnaissance computer attack is one in which an intruder interacts with the targeted system to gather information about vulnerabilities. The term reconnaissance comes from the military, where it refers to a mission into enemy territory to gather intelligence
What exactly is reconnaissance research?The reconnaissance survey is a thorough examination of an entire area that could be used for a road or an airfield. Its goal is to identify the more promising routes or sites while eliminating those that are impractical or unfeasible. Existing maps and aerial photographs may be extremely useful.
learn more about Cyber attacks visit:
brainly.com/question/28270451
#SPJ4
Project stem
Assignment 7: calender
Answer:
import calendar
year = int(input("Enter a year: "))
month = int(input("Enter a month: "))
print(calendar.month(year, month))
Explanation:
since you didnt mention what program to use, im going to answer using python.
"in social media we are the product, and we are letting others attribute value to us" T/F
True. In the context of social media, it is often said that "we are the product." This means that our personal information, activities, and engagement on social media platforms are collected, analyzed, and monetized by the platform owners or advertisers.
By using social media, we essentially provide valuable data and attention, which can be used for targeted advertising, content recommendation algorithms, and other purposes that generate revenue for the platform.
Furthermore, by participating in social media, we allow others to attribute value to us. This can involve the profiling of users based on their preferences, interests, demographics, and online behavior. Advertisers and marketers can then leverage this information to target specific audiences with personalized content and advertisements, effectively attributing value to different user segments.
While social media platforms offer various benefits and opportunities for connection and expression, it is important to be aware of the underlying dynamics and the implications of being the product in this context. Users should understand the extent to which their data is being collected and used, and make informed decisions about their online presence and privacy settings.
learn more about information here
https://brainly.com/question/32167362
#SPJ11