Question #4
Multiple Select
Which of the following statements are true when addressing feedback? Select 3 options.
Most negative feedback should be ignored.
The feedback loop is not closed until action is taken to address the feedback.
Negative feedback that is addressed correctly can help build customer loyalty.
Analytics and other new technologies help developers evaluate feedback.
All feedback should be prioritized equally.

Answers

Answer 1

Answer:

Negative feedback that is addressed correctly can help build customer loyalty..

Analytics and other new technologies help developers evaluate feedback.

The feedback loop is not closed until action is taken to address the feedback.

Explanation:

Feedbacks are simply complaints, abuses, praise which service providers do get when customers allowed to respond or give commebts on the services rendered. It is an essential channel for consumers to channel Thor grievances and well as praise while also allowing service providers take adequate note of shortcomings and areas which could be improved upon in their products or service offering. Proper evaluation of feedbacks with regards to sensitivity and humor goes a long in molding good customer relationship and loyalty.

Prioritization of negative feedbacks by angry customers should be handled carefully and noted in other to proffer adequate fix and foster good future relationship.


Related Questions

Why are the READ and DATA statements used
together?​

Answers

Explanation:

DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.

which cloud service model provides access to an application that is built, monitored, and offered by the cloud provider?

Answers

SaaS cloud service model provides access to an application that is built, monitored, and offered by the cloud provider.

What is cloud service?

The term "cloud services" refers to a variety of IT tools and resources such as platforms, infrastructure, and software that are hosted by outside providers and made available to businesses and private individuals on demand over the internet. Therefore, the terms can be used interchangeably. They can also be referred to as cloud computing.

In order to achieve economies of scale, cloud services depend on resource sharing over the internet. Nine out of the top ten cloud service providers use Linux, making it the most popular operating system for cloud computing. It powers about 90% of the workload on public clouds.

Learn more about cloud services

https://brainly.com/question/29531817

#SPJ4

on a linux computer, what contains group memberships for the local system?

Answers

The computer networks and systems of a company are protected by security measures that are planned and implemented by information security experts.

The day-to-day management of computer networks is the responsibility of network and computer systems administrators. A 64-bit file system called XFS was initially shown in 1994 and has been a part of the Linux kernel since 2001. It is RedHat Linux's default file system. The largest file size supported by XFS is 8 EiB, while the filename length is limited to 255 bytes.

To do this, the file's inode has a link count that shows how many directory entries altogether refer to it. A file is only actually destroyed when the number of links to its inode is zero.

This team, also referred to as a "computer incident response team," is in charge of reacting to security lapses, viruses, and other potentially disastrous situations in businesses that confront high security risks.

Know more about computer networks here:

https://brainly.com/question/13992507

#SPJ4

Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is 6 years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?

Read the following scenario, and then decide if you should upgrade the computer. You have a desktop that

Answers

Answer:

Upgrade

Explanation:

EDGE 2021

Answer:

B. Upgrade

Explanation:

Because you have a desktop, upgrading the CPU and RAM are an easy and inexpensive fix. Upgrading a laptop is more difficult and often requires purchasing a new computer.

I hope this helps<3

Have a nice day everyone<3

Question: An ILP problem has 5 binary decision variables. How many possible integer solutions are there to this problem? a. 5 b. 10 c. 25 d. 32.

Answers

The possible integer solutions to this problem are :

(d.) 32.

ILP stands for Integer Linear Programming, which is a method of optimization that entails finding the maximum or minimum of a linear objective function, subject to linear constraints where all the variables involved are limited to integers only.

A binary decision variable is one that can take one of two values: 0 or 1. Such variables are commonly used in optimization issues, particularly in mathematical optimization. Such variables are particularly useful in the production of logical statements, as well as decision-making processes.

Here, we are given that the ILP problem has 5 binary decision variables.

The number of possible solutions can be determined by calculating the total number of feasible solutions. The feasible solutions can be calculated as:

2 × 2 × 2 × 2 × 2 = 32

Thus, there are 32 possible integer solutions to the given problem. The answer is option d.

To learn more about ILP visit : https://brainly.com/question/27855584

#SPJ11

I need some help with this project. The picture of the assignment is above

I need some help with this project. The picture of the assignment is above

Answers

Answer:

sorry

Explanation:

you need to do this on your own Wahhabi

but if you sub to my you-tube channel at chris got ha,x i will help you out

Check the devices that are external peripheral devices:

Check the devices that are external peripheral devices:

Answers

Answer:

Mouse, and keyboard

Explanation:

Common Sense

1.) Write the formula, which assigns double x to double n raised to the double z power.
.
2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.
.
3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)
.
4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:
double num1, num2

Answers

Answer:

1.) Write the formula, which assigns double x to double n raised to the double z power.

Answer: 2\times x → 2\times n^(2\times z)

2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.

Answer: 5\plus 2\times t^3→2\times x

3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)

Answer: 2\times x → \sqrt \{(l^2)_1 + (l^2)_2\}= hypotenuse

4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:

double num1, num2

Answer: length = \sqrt\{|num2 - num1\|} → 2\times x

Explanation:

\(.\)

Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. Please select the best answer from the choices provided T F.

Answers

A web resume is far better than a traditional resume because it can carry so much data about the person, and it includes images also. This statement is true.

What is a web resume?

A web resume is termed as a resume that is read by a computer program that summarizes the information of each employee.

Web resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the web resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, apna, and so on there are many companies that ask about the person before creating an account.

More about the web resume link is given below.

brainly.com/question/862477

Answer:

true

Explanation:

differences between word processor and typewriter​

Answers

The differences between word processor and typewriter​ are given below:

Word Processor:

Documents can be saved, printed, and shared electronically.

Multiple documents can be open simultaneously, and changes can be easily made and undone.

Word processors often include templates for various document types like resumes, letters, and reports.

Typewriter:

A typewriter is a mechanical device used for writing and producing printed text on paper.

It uses individual keys for each character and requires manual effort to press the keys and produce text.

Typewriters offer limited formatting options, typically only allowing for basic text alignment and bold or underline options.

Corrections are more difficult on a typewriter, often requiring correction fluid or erasing and retyping.

Read more about word processors here:

https://brainly.com/question/29762855

#SPJ1

Distinguish between project buffers and feeder buffers.
What is each buffer type used to accomplish?

Answers

Project buffers and feeder buffers are two types of buffers used in project management. Project buffers are used to protect the project completion date, while feeder buffers are used to protect individual activities within the project.

Project buffers and feeder buffers are part of the Critical Chain Project Management (CCPM) methodology, which aims to improve project scheduling and delivery. A project buffer is a time buffer placed at the end of the project schedule. Its purpose is to protect the project completion date from potential delays and uncertainties. The project buffer absorbs any variations or delays that may occur in the project, providing a buffer of time to prevent the overall project timeline from being compromised.

On the other hand, feeder buffers are placed at the end of individual activities or chains of activities that feed into critical project paths. Feeder buffers protect specific activities or chains from disruptions or delays that could impact the overall project timeline. They provide a cushion of time to absorb any variations or uncertainties that may arise within those activities, ensuring that they do not cause delays to the critical path and ultimately the project completion. In summary, project buffers safeguard the project completion date, while feeder buffers protect specific activities or chains within the project. Both types of buffers are used to manage uncertainties, variability, and potential delays, ultimately aiming to improve project delivery and ensure timely completion.

Learn more about CCPM here:

https://brainly.com/question/14528350

#SPJ11

name at least two actions that you might take if you were to see a large animal on the right shoulder of the road in front of you​

Answers

Answer:

Explanation:

Scan the road ahead from shoulder to shoulder. If you see an animal on or near the road, slow down and pass carefully as they may suddenly bolt onto the road. Many areas of the province have animal crossing signs which warn drivers of the danger of large animals (such as moose, deer or cattle) crossing the roads

mark me brillianst

what is the first thing you should check if you discover that domain names are not resolving into ip addresses on a pc or workstation?

Answers

The first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation is the DNS server settings. DNS (Domain Name System) servers are responsible for resolving domain names into IP addresses, so if there is an issue with these settings, it can result in domain names not resolving into IP addresses.

To check the DNS server settings on a Windows PC, follow these steps:

Click the Windows Start button and select "Control Panel".Click "Network and Internet" and then "Network and Sharing Center".Click "Change adapter settings" on the left side of the window.Right-click on the network adapter you are using and select "Properties".Scroll down to "Internet Protocol Version 4 (TCP/IPv4)" and select it.Click the "Properties" button.Make sure that "Obtain DNS server address automatically" is selected. If it is not, select it and click "OK".

If this does not resolve the issue, you may need to contact your network administrator or internet service provider for further assistance.

Learn more about DNS server: https://brainly.com/question/18274277

#SPJ11

Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School

Answers

Answer:

print("What year of high school are you in?")

grade = input()

grade = grade.lower()

if grade == "freshman":

   print("You are in grade: 9")

elif grade == "sophomore":

   print("You are in grade: 10")

elif grade == "junior":

   print("You are in grade: 11")

elif grade == "senior":

   print("You are in grade: 12")

else:

   print("Not in high school")

Explanation:

The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.

grade.lower():

The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.

Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.

errors like segmentation fault, access violation or bad access are caused due to _____.

Answers

Errors like segmentation fault, access violation or bad access are caused due to various reasons. It could be caused due to a software bug, hardware defect, memory corruption, or stack overflow or some other reasons.

Each programming language has different reasons for the occurrence of these errors. For example, in C and C++ programming, the segmentation fault error occurs when a program tries to access a memory location that is out of bounds or is not allocated to that program.The access violation error occurs when a program attempts to read or write data from a memory location that is not allowed or doesn't have proper permissions. Similarly, the bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.Explained in 130 words:Errors like segmentation fault, access violation or bad access are caused due to various reasons, including software bugs, hardware defects, memory corruption, stack overflow or some other reasons. Each programming language has different reasons for the occurrence of these errors. In C and C++, segmentation fault occurs when a program tries to access a memory location that is out of bounds or not allocated to the program, while access violation occurs when a program tries to read or write data from a memory location that is not allowed or doesn't have proper permissions. The bad access error is raised when a program tries to access an invalid memory address or location beyond the array bounds or buffer size.

To know more about programming language visit:

brainly.com/question/23959041

#SPJ11

Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.​

Answers

In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Why do you need to translate a program written in a high-level language into machine language?

Programming languages are known to be easy for humans to read and understand.

Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.

Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Learn more about machine language from

https://brainly.com/question/23275071

#SPJ1

3.2.1.1 if statements checkpoint 4

Answers

An IF statement is a way to make decisions based on a condition.

What is an IF statement?

It has two possible outcomes: one for when the condition is true, and one for when it is false. For example, in Excel, you can use an IF statement to check if a cell value is “Yes” or “No” and return a different number accordingly. You can also combine IF statements with other functions like AND, OR and NOT to test multiple conditions2. Here is an example of an IF statement in Excel:

=IF(A1>10,“Large”,“Small”)

This formula checks if the value in cell A1 is greater than 10. If it is, it returns “Large”. If not, it returns “Small”. This is how you can use an IF statement to control the flow of your program or spreadsheet based on a logical test.

To learn more about IF statement, visit: https://brainly.com/question/30751419

#SPJ1

What does your car driver look like? Answer the following question.

1. How many minutes do you drive every day?

2. How long do you travel every day?

3. What trips could you make in any other way?

4. What are the risks / dangers of traveling by car?

Answers

Answer:

42 miami to pakistan

Explanation: buy

why organization keep documents in word format and publish them in pdf format?

Answers

Organizations keep documents in Word format and publish them in PDF format because of the following reasons: Reasons to keep documents in Word format1. Easy to edit: Word documents are designed to be edited. They can be opened, edited, and saved with ease.2.

Formatting: Word documents offer a wide range of formatting options. The formatting options are easier to use than in other formats.3. Collaboration: Word documents can be shared and edited by many people. Multiple authors can work on the document simultaneously. Reasons to publish documents in PDF format1. Preserves formatting: PDF documents preserve the formatting of the original document.

They are designed to ensure that the document appears the same regardless of the device it is viewed on.2. Security: PDF documents can be secured by password or digital signature. This ensures that the document is not altered by unauthorized people.3. Size: PDF documents are smaller in size compared to Word documents. This makes them easier to transfer over the internet.

Learn more about Word format at https://brainly.com/question/31983788

#SPJ11

name two components required for wireless networking
(answer fastly)​

Answers

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

Telecommunications, Bridges, Power and energy, combine them to form one sentece

Answers

The combined sentence is given below

In the world today, the use of Telecommunications is acting as Bridges between the old and the new,  there are new innovations in the are of Power and energy,

Describe what telecommunication is?

Information is transmitted electronically over distances through telecommunications. The data could take the shape of voice calls, data, text, photos, or video. These days, telecommunications are utilized to connect relatively far-flung computer systems into networks.

Therefore, one can say that by altering sentence structure, sentence combining "smooths out" rough writing and makes a piece of writing more interesting for the reader. Simply connecting words with a conjunction such as seen above.

Learn more about Telecommunications  from

https://brainly.com/question/26152499
#SPJ1

which methodology provides a framework for breaking down the development of software into four gates?

Answers

Answer:

RUP

Explanation:

many countries restrict the use or exportation of cryptographic systems. what is the reason given when these types of restrictions are put into place?

Answers

Although the U.S. government has significantly decreased its prohibitions on the export of cryptography, some still exist. Any nation that the United States has designated as aiding terrorism is prohibited from purchasing products that use encryption. The worry is that the government won't be able to crack the encryption used by the country's enemies to hide their communications and track their data transfers.

What is Encryption?

The process of converting information into a secret code that conceals its true meaning is known as encryption. Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.

The science and art of changing signals to make them secure and impervious to attackers is known as cryptography. It is a technique for keeping and sending data in a specific format that only the intended audience can read and process. Cryptography can be used for user authentication in addition to safeguarding data against theft and modification.

Learn more about Cryptography click here:

https://brainly.com/question/88001

#SPJ4

1. A type of drawing used to represent the exact size and shape of an object having inclined surfaces. a. audiary drawing c. sectional drawing d perspective drawing​

Answers

Answer:

Auxiliary  drawing

Explanation:

which of the following is one of the most primary maintenance steps for software? a. saving all of your files on a flash drive b. closing windows that you are no longer using c. keeping software programs up-to-date d. turning your computer off each time it freezes

Answers

The most primary maintenance step for software is c) keeping software programs up-to-date. The correct option is option c.

The maintenance of software is important to ensure its proper functioning and longevity. There are various steps that one can take to maintain software. Among the options given, keeping software programs up-to-date is one of the most primary maintenance steps for software. Updating software ensures that any bugs or security issues are fixed, and new features are added. It also helps in optimizing the performance of the software. In conclusion, to maintain software properly, it is important to keep it up-to-date. This can be done by regularly checking for updates and installing them as soon as they are available.

To learn more about software, visit:

https://brainly.com/question/32237513

#SPJ11

When would you use an omnidirectional microphone?


when there are three or more actors in a scene

when it is a windy day and you want to reduce the sound of the wind in the recording

when you want to get outdoor sounds that relate to an outdoor scene in a film

when you want to record in surround sound

Answers

Answer:

when it is a windy day and you want to reduce the sound of the wind in the recording

a. Mohit has bought a new laptop. The laptop is not working as no software is installed in
Which software should be installed first to make his laptop start working?​

Answers

The windows software should be installed first to make his laptop start working.

What is the Microsoft Windows?

This is known to be the Operating system and it is one that  is said to be made up  of a group of a lot of proprietary graphical operating system families made and marketed by Microsoft.

Note that the windows comes in different version such as:

Windows 11windows 10windows 8windows 7, etc.

Therefore, for your laptop to start, it need to have one of the windows written above.

The windows software should be installed first to make his laptop start working. and by installing the windows be it windows 10, 8, 7, etc., it will start working.

Learn more about software from

https://brainly.com/question/1538272

#SPJ1

which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?

Answers

type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities Reconnaissance

What occurs during reconnaissance?

Reconnaissance is the act of gathering information about a target prior to launching an attack. Reconnaissance is performed to identify weaknesses, vulnerabilities, holes, activity, and nodes that attackers can use to target an organisation.

What exactly is active reconnaissance?

An active reconnaissance computer attack is one in which an intruder interacts with the targeted system to gather information about vulnerabilities. The term reconnaissance comes from the military, where it refers to a mission into enemy territory to gather intelligence

What exactly is reconnaissance research?

The reconnaissance survey is a thorough examination of an entire area that could be used for a road or an airfield. Its goal is to identify the more promising routes or sites while eliminating those that are impractical or unfeasible. Existing maps and aerial photographs may be extremely useful.

learn more about reconnaissance visit:

https://brainly.in/question/3978541

#SPJ4

type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities Reconnaissance

What occurs during reconnaissance?

Reconnaissance is the act of gathering information about a target prior to launching an attack. Reconnaissance is performed to identify weaknesses, vulnerabilities, holes, activity, and nodes that attackers can use to target an organisation.

What exactly is active reconnaissance?

An active reconnaissance computer attack is one in which an intruder interacts with the targeted system to gather information about vulnerabilities. The term reconnaissance comes from the military, where it refers to a mission into enemy territory to gather intelligence

What exactly is reconnaissance research?

The reconnaissance survey is a thorough examination of an entire area that could be used for a road or an airfield. Its goal is to identify the more promising routes or sites while eliminating those that are impractical or unfeasible. Existing maps and aerial photographs may be extremely useful.

learn more about Cyber attacks visit:

brainly.com/question/28270451

#SPJ4

Project stem
Assignment 7: calender

Answers

Answer:

import calendar

year = int(input("Enter a year: "))

month = int(input("Enter a month: "))

print(calendar.month(year, month))

Explanation:

since you didnt mention what program to use, im going to answer using python.

"in social media we are the product, and we are letting others attribute value to us" T/F

Answers

True. In the context of social media, it is often said that "we are the product." This means that our personal information, activities, and engagement on social media platforms are collected, analyzed, and monetized by the platform owners or advertisers.

By using social media, we essentially provide valuable data and attention, which can be used for targeted advertising, content recommendation algorithms, and other purposes that generate revenue for the platform.

Furthermore, by participating in social media, we allow others to attribute value to us. This can involve the profiling of users based on their preferences, interests, demographics, and online behavior. Advertisers and marketers can then leverage this information to target specific audiences with personalized content and advertisements, effectively attributing value to different user segments.

While social media platforms offer various benefits and opportunities for connection and expression, it is important to be aware of the underlying dynamics and the implications of being the product in this context. Users should understand the extent to which their data is being collected and used, and make informed decisions about their online presence and privacy settings.

learn more about information here

https://brainly.com/question/32167362

#SPJ11

Other Questions
For the function -3x^2+12find the interval(s) over which the function is decreasing. Maria has always taken responsibility for preparing family meals because she learned that this was expected of women. Her behavior best illustrates the influence of A student finished 8 of her homework problem in class. IF the ratio of problems she finished to problems she still had left was 4: 1, how many homework promblems did she have total? over which interval is the graph of f(x)=-(x+8)^2-1 decreasing Which industries do you think have the strongest emotionalattachment between its customers and their organizations? which philosophy of advertising focuses on building a thought process that dismisses preconceived notions and instead attempts to create from scratch what a good or service should look like? Why do economists use real GDP rather than nominal GDP to gauge? how do molecules that are too large to pass through the cell membrtane move into the cell mperial gothic: religious architecture and high anglican culture in the british empire c.1840-1870, by g. a. bremner, is published by yale A system of three linear equations in three variables is inconsistent. How many solutions to the system exist?. DUE FRIDAY (02/26/2021): ABC ~ LMN, AB=18, BC=12, LN=9, and LM=6. What is the similarity ratio of ABC to LMN? Kara scores 3 points when she completes the first level of a video game. At each level after that she scores 3 times the amount awarded at the previous level. If she completes 4, how many points does she score in all? A large smartphone company produces 15,000 smartphones per hour.How long would it take this company to produce 300,000 smartphones?15 h20 h30 h40h Which of the following types of power is designated solely to state governments according to a clause in the 10th amendment to the U.S. Constitution?reserved powers such as the right to issue birth certificates Which is closest to the volume of this circular cone? a. 150.8 mm cubed b. 37.5 mm cubed c. 47.12 mm cubed d. 188.5 mm cubed please let me have premium i'll do something strange for a piece of change 10. Quin es Martin Antolnez the most common type of eyewash stations are plumbed eyewash stations, which use tap water from pipes connected to municipal water lines. An object accelerates to a velocity of 230 m/s over a time of 5 s. The acceleration it experienced was 40 m/s2. What was its initial velocity? * Convert 13/2 to a decimal using long division.