a control system where the output variable is compared with an input parameter and their difference is used to drive the output is called

Answers

Answer 1

The control system where the output variable is compared with an input parameter and their difference is used to drive the output is called the closed-loop control system.

A control system is a set of devices, mechanisms, or procedures that are used to regulate, manage, and manipulate the behavior of other systems. Its main goal is to drive the output, whether it's a physical or virtual process. It involves a feedback loop that allows it to adjust and optimize its performance by continually analyzing its inputs and outputs. A closed-loop control system is a type of control system that uses feedback to compare the output variable with an input parameter. The difference between the two is then used to drive the output. This process is repeated continuously to ensure that the output is always in line with the input parameter.

Hence, The control system where the output variable is compared with an input parameter and their difference is used to drive the output is called the closed-loop control system.

Learn more about control systems:

brainly.com/question/5711964

#SPJ11


Related Questions

A workspace that an employee accesses using a Web browser fits the definition of a _____.

•mobile device
•Wifi-enabled device
•collaborative environment
•virtual workspace​

Answers

Answer:

virtual workspace

Explanation:

I hope I've helped

Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the assembly program’s instruction set consists of 198 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. A. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. How many additional instructions could be added to this instruction set without exceeding the assigned number of bits? Discuss and show your calculations. D. What is the largest unsigned binary number that the address can hold?

Answers

The number of bits that are needed for this operation code (opcode) is equal to 8 bits.

Given the following data:

Number of operations = 198.Instruction size, I = 24 bits.

How to calculate the number of bits.

The number of bits that are needed for this operation code (opcode) is given by this mathematical expression:

\(2^n > 198\\\\2^8 > 198\\\\256 > 198\)

n = 8 bits.

b. To determine the number of bits that are left for the address part of the instruction:

Opcode, O = 8 bits.Instruction size, I = 24 bits.

Address = Instruction size - Opcode

Address = 24 - 8

Address = 16 bits.

c. To determine the maximum allowable size for memory:

Based on the memory unit, this is given by \(2^{16}\times 24\)

d. The largest unsigned binary number that can be accommodated in one word of memory is equal to \(2^{24}-1\)

Read more on binary number here: https://brainly.com/question/5381889

a) why must the forwarding function remain on the network device? (the answer is not in the text.) b) what might be holding back son in many firms?

Answers

As the network device is in charge of the actual transmission of data packets, the forwarding function must remain there. Routers and switches are examples of network devices

What hardware is in charge of transmitting data packets between networks?

A router can connect one or more packet-switched networks or subnetworks. It controls traffic between several networks and enables multiple devices to share an Internet connection by transmitting data packets to their intended IP addresses.

Which gadget ensures that data packets reach the correct address by forwarding them through various networks?

A router is a physical or virtual device that joins networks by transmitting information-packed data packets. The data is examined by routers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ4

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

All assignments must follow the APA format and must contain references. Your answer (in total) must be between 550 to 650 words. For this assignment, you are doing a preliminary report. In this report

Answers

Zimbabwe's top three traded products are agricultural goods, minerals, and tourism services.

How is this  so?

Challenges faced by the country include economic constraints, infrastructure limitations, and trade imbalances.

To address these issues, Zimbabwe should implement economic reforms, invest in infrastructure, and promote export diversification.

These measures would stabilize the economy, improve trade connectivity, and enhance competitiveness.

Learn more about preliminary report at:

https://brainly.com/question/30807784

#SPJ4

Full Question:

Although part of your question is missing, you might be referring to this full question:

All assignments must follow the APA format and must contain references. Your answer ( in total ) must be between 550 to 650 words. For this assignment, you are doing a preliminary report. In this report, you will have to pick ONE country and prepare research topics for my review. Step 1 : Pick ONE of the following countries. a) Zimbabwe, b) Sri Lanka, C ) Country of your choice. Step 2 : Describe the top 3 products/services that your country trades in ( import and export ) and explain WHY? Step 3 : Discuss the current challenges facing your country and its trade objectives. Step 4 : Present 3 possible solutions to these challenges.

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

Predict the output a b= 12 13 print(print(a+b)) ​

Answers

Answer:

Invalid Syntax

We if correct the syntax then output is 25

Explanation:

In the given question a=12 ,b=13 if we used print(print(a+b)) ​ this syntax then invalid syntax will occur if we correct the syntax then correct syntax program is given below

a =12

b=13

print(a+b)

it gives 25 as output because we used "+" operator between a and b variable this operator provide addition between the two variable .

Find the output Y of the 4-bit barrel shifter in
Figure-9 for each of the following bit
pattern applied to S1, S0, D3, D2, D1, and D0: a) 110101
b) 011010 c) 101011 d) 001101

Answers

The output Y of the 4-bit barrel shifter for the given bit patterns are: a) 1011, b) 0011, c) 0101, d) 0011.

To find the output Y of the 4-bit barrel shifter for each given bit pattern, we will analyze the truth table of the barrel shifter as shown in Figure-9. The barrel shifter has two control inputs (S1 and S0) and four data inputs (D3, D2, D1, D0), where D3 is the most significant bit and D0 is the least significant bit. The output Y will depend on the combination of the control inputs and data inputs.

Let's evaluate the output Y for each given bit pattern:

a) Bit pattern: 110101

  S1 = 1, S0 = 1

  The control inputs S1 and S0 indicate that a left rotation is required.

  The data inputs D3, D2, D1, D0 are 1101.

  After the left rotation, the output Y will be 1011.

  Therefore, for the given bit pattern, the output Y is 1011.

b) Bit pattern: 011010

  S1 = 0, S0 = 1

  The control inputs S1 and S0 indicate that a right rotation is required.

  The data inputs D3, D2, D1, D0 are 0110.

  After the right rotation, the output Y will be 0011.

  Therefore, for the given bit pattern, the output Y is 0011.

c) Bit pattern: 101011

  S1 = 1, S0 = 0

  The control inputs S1 and S0 indicate that a logical shift left is required.

  The data inputs D3, D2, D1, D0 are 1010.

  After the logical shift left, the output Y will be 0101.

  Therefore, for the given bit pattern, the output Y is 0101.

d) Bit pattern: 001101

  S1 = 0, S0 = 0

  The control inputs S1 and S0 indicate that no shift or rotation is required.

  The data inputs D3, D2, D1, D0 are 0011.

  Since no shift is performed, the output Y will be the same as the input.

  Therefore, for the given bit pattern, the output Y is 0011.

In summary:

a) Output Y = 1011

b) Output Y = 0011

c) Output Y = 0101

d) Output Y = 0011

These results are obtained by analyzing the control inputs S1 and S0 to determine the type of shift or rotation required, and then applying the corresponding operation to the data inputs. The output Y represents the shifted or rotated version of the input data.


To learn more about barrel shifter click here: brainly.com/question/25342746

#SPJ11


Complete Question:

Find the output Y of the 4-bit barrel shifter inFigure-9 for each of the following bitpattern applied

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

When your browser fetches pages and graphics to form a web page, it stores that material on your device in temporary files referred to as: Group of answer choices browser home page email client FTTH browser cache

Answers

Answer:

cache

Explanation:

a cache is temporary files that are pulled from the servers, and these files are a part of the web page.

Which phrase refers to the collection of geospatial data through the use of satellite images/pictures?

Answers

Answer:

The appropriate answer will be "Using remote sensing".

Explanation:

Such basic applications of Earth's remote sensing images usually involve:

Heavily forested fires could be viewed out of space, enabling the wanderers to have a much wider area than those of the field. Trying to track particles to accurately forecast the weather either watch volcanic eruptions, including helping out for outbreaks of dust.

So that the above is the correct solution.

plzzz help ya girl out due soon

plzzz help ya girl out due soon

Answers

The answer to this question is D. This is because programming language is a language used to run the application software. A programmer or developer writes code, and the code language (most common is JavaScript) is translated and it runs the program.

given a logical address 0x46a6 (in hexadecimal) with a page size of 256 bytes, what is the page number? a. 0x4a b. 0x4a6 c. 0x4646 d. 0x46 e. 0x004a f. your answer:

Answers

The page number will be D) 0x46 if you are given a logical address 0x46a6 (in hexadecimal) with a page size of 256 bytes.

To find the page number, we need to divide the logical address by the page size and take the floor of the result. In this case, the logical address 0x46A6 divided by the page size of 256 bytes (0x100 in hexadecimal) is 0x46A6 / 0x100 = 0x46 with a remainder of 0xA6. Therefore, the page number is 0x46.

This means that the memory access with logical address 0x46A6 belongs to the 46th page in the memory. The page number helps to determine the physical address of the data being accessed in the memory.

For more questions like Logical address click the link below:

https://brainly.com/question/27897332

#SPJ4

Which statement is most likely to be true of a self-driving vehicle rated at
automation level 2 (partial automation)?
A. The vehicle is mostly controlled by artificial intelligence.
B. The vehicle is completely controlled by a computer.
C. The driver's seat does not need to be occupied.
D. The vehicle may use artificial intelligence to stay in the correct
lane.

Answers

Answer:

i would select D.

Explanation:

D is definitely the correct answer.

Select the correct answer
in the context of website navigation, what is a node?
a point at which the user chooses a certain path
a part of a web page that gives it a unique identity
a navigational aid that tells users know where they are
a hyperlink that leads to the home page

Answers

Answer:

a point at which the user chooses a certain path.

Answer:

a point at which the user chooses a certain path.

Explanation:

Modify the Extended_Add procedure in Section 7.5.2 to add two 256-bit (32-byte) integers - data val1 BYTE '8' val2 BYTE '9' . code mov ah, o mov sub al, val2 ​
al, val1 ;AX=00FFh

;AX=0038 h
sub al, val2 aas ​
;AX=OOEFh
;AX=FFO9h

pushf ; ; save the Carry flag or al,30h ; AX=FF39 h popf ; restore the Carry flag

Answers

To modify the Extended_Add procedure to add two 256-bit (32-byte) integers, you can use the following assembly code:

assembly-

data

   val1 BYTE '8'

   val2 BYTE '9'

code

   mov ah, 0

   mov al, val1

   add al, val2 ; AL = '8' + '9' = '17' (decimal)

   pushf ; Save the Carry flag

   or al, 0x30 ; Add 0x30 to convert the result to ASCII

   popf ; Restore the Carry flag

In this modified code, we use the add instruction to add the values of val1 and val2, which are ASCII characters representing the numbers '8' and '9'. The result is stored in the al register.

To convert the result to ASCII, we add 0x30 (which is the ASCII value of '0') to the lower 4 bits of al using the or instruction. This converts the result to the corresponding ASCII character.

Note: The original code snippet you provided contained some incorrect instructions (sub and aas). I have replaced them with the appropriate instructions for addition and ASCII conversion.

Learn more about assembly code here:

https://brainly.com/question/31590404

#SPJ11

how to turn off location without the other person knowing?

Answers

Answer:

How to Turn off Location without the Other Person Knowing

Turn on Airplane mode. ...

Turn off 'Share My Location' ...

Stop Sharing Location on Find My App. ...

Using GPS spoofer to change location. Explanation:

Which Buddhist practice was alien to the social system and
values in China?
Temple building
Ancestor veneration
Bodhisattva veneration
Monasticism
Meditation

Answers

Monasticism was the Buddhist practice that was initially alien to the social system and values in China.

Monasticism refers to the practice of individuals renouncing worldly life to live in seclusion and dedicate themselves to spiritual pursuits.

Buddhism was introduced to China, monasticism was a practice that differed significantly from the existing social system and values.

China had a deeply ingrained Confucian tradition that emphasized family and social responsibilities. Ancestor veneration, for example, was an essential part of Chinese culture and played a significant role in their social system. In contrast, monasticism involved individuals leaving their families and societal obligations to pursue spiritual enlightenment .

Initially, monasticism faced resistance and was seen as a practice that undermined the Confucian values of filial piety and duty towards society. The idea of renunciation and detachment from worldly affairs was not readily accepted in Chinese society, which placed a high value on family ties and societal obligations.

Over time, however, Buddhism adapted to the Chinese cultural context and integrated with local customs and practices. Monasticism gradually gained acceptance and even became an integral part of Chinese Buddhism. Monasteries were established, and monastic life became an esteemed path for spiritual practice and the spread of Buddhist teachings in China.

It is worth noting that while monasticism initially faced resistance, other Buddhist practices such as temple building, ancestor veneration, bodhisattva veneration, and meditation aligned more closely with Chinese values and were relatively easier to assimilate into the existing social system.

Learn more about enlightenment here:

https://brainly.com/question/1600484

#SPJ11

USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:

Answers

Answer:

10 Gbps

Explanation:

The full form USB is Universal Serial Bus. It is used to connect to electronics as well as computers. The 3.1 USB is a recent and advance version of the USB standard. It was released in the year 2013. It can transfer data speed up to a speed of 10 Gbps.

It USB 3.1 can use the USB-C connector types and other connector types as well.

tle electrical instulation maintance
1.what is inventory 2. what is job order 3. what is barrow form 4. what is purchase request

Answers

Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance.  A job order is a document that contains all the information necessary to complete a specific maintenance task.

Definition of the aforementioned questions

1) Inventory refers to the process of keeping track of all materials and equipment used in electrical insulation maintenance. This includes maintaining a list of all the items in stock, monitoring their usage, and ensuring that there are enough supplies to meet the demands of the job.

2) A job order is a document that contains all the information necessary to complete a specific maintenance task. This includes details about the task, such as the materials and tools required, the location of the work, and any safety considerations.

3) A barrow form is a document used to request materials or equipment from the inventory. It contains details about the requested item, including the quantity, the purpose of the request, and the name of the person or team making the request. The form is usually signed by an authorized person and submitted to the inventory manager or other appropriate personnel.

4) A purchase request is a document used to initiate the process of purchasing new materials or equipment for the electrical insulation maintenance program. It contains details about the item to be purchased, including the quantity, the cost, and the vendor or supplier. The purchase request is typically reviewed and approved by a supervisor or manager before the purchase is made.

learn more about electrical insulation maintenance at https://brainly.com/question/28631676

#SPJ1

what is a binary digit

Answers

one of two digits (0 or 1) in a binary system of notation.
(i looked it up)

Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow.
Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value.
Ex: If the input is:
5 50 60 140 200 75 100

Answers

The program outputs all integers from the input list that are less than or equal to the provided threshold value.

What does the given program do with the input list of integers and the threshold value?

The given program takes input from the user, starting with an integer indicating the number of integers to follow. It then retrieves a list of integers from the input.

The last value in the input indicates a threshold value. The program's output displays all the integers from the input list that are less than or equal to the threshold value.

For example, if the input is "5 50 60 140 200 75 100," the program will consider 50 as the threshold value. The program will then output all the integers from the input list (60, 140, 200, 75, and 100) that are less than or equal to 50.

Learn more about program

brainly.com/question/30613605

#SPJ11

When a variable is assigned a number that is too large for its data type, it:A) underflowsB) overflowsC) reverses polarityD) exceeds expectationsE) None of the above

Answers

When a variable is assigned a number that is too large for its data type, it: B) overflows.

What is database?

A database in computing is a structured collection of data that is electronically accessible and stored. Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system. Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing challenges, such as providing concurrent access and fault tolerance, are all part of the design of databases. In order to collect and process data, a database management system (DBMS) communicates with applications, end users, and the database itself. The primary tools offered to manage the database are also included in the DBMS software.

To know more about database visit:

https://brainly.com/question/29775297

#SPJ1

Write a method that takes a parameter for the number of a month and prints the month's name. You may assume that the actual parameter value passed to the method is always between 1 and 12 inclusive.

This method must be called monthName() and it must have an integer parameter.

Calling monthName(8) should print August to the screen.

Answers

Answer:

Get month number from month name

Use Java's Calendar class. It can parse any given string into a valid calendar instance. Here is an example (assuming that the month is in english). Date date = new SimpleDateFormat("MMMM").parse(monthName); Calendar cal = Calendar.getInstance(); cal.setTime(date); println(cal.get(Calendar.MONTH)); You can specify the language in SimpleDateFormat: String monthName = "März"; // German for march Date date = new SimpleDateFormat("MMMM", Locale.GERMAN).parse(monthName); Calendar cal = Calendar.getInstance(); cal.setTime(date); println(cal.get(Calendar.MONTH)); By default, Java uses the user's local to parse the string. Keep in mind that a computer starts counting at 0. So, January will be 0. If you want a human readable date, you should format the calendar instance: SimpleDateFormat inputFormat = new SimpleDateFormat("MMMM"); Calendar cal = Calendar.getInstance(); cal.setTime(inputFormat.parse(monthName)); SimpleDateFormat outputFormat = new SimpleDateFormat("MM"); // 01-12 printlng

MARK ME BRAINIEST FOR MORE INFO

What is constructive criticism?

Advice and possible solutions intended to help or improve something
Information given to others as a way to make them feel unintelligent
Reports about decreasing profits
Statements and no possible solutions aimed at showing problem areas

Answers

Answer:

Constructive cristsism is a helpful way of giving feedback that provides specific, actionable suggestions. Or, its a nice way of criticizing someone and telling them what to do better

Answer:

Advice and possible solutions intended to help or improve something

Explanation:

I took the test and Got it Correct!

mention
any
5
indicators of
happiness​

Answers

Answer:

5 indicators of happiness that might surprise you · Happiness is deep · Happy is busy · Can't buy me happiness · The happiness gene · No regrets.

Explanation:

1. Can’t but happiness

Project overview in paragraph format:

•Project name

•Current status date of this report (Sept 27, 2018)

•Planned start date, actual start date, planned finish date and BAC (from Project statistics)

•List the summary Tasks that have been completed to date (ignore detail tasks)

•List the summary Tasks that have not been completed to date (ignore detail tasks)

•Metrics for the project (not individual tasks or summary tasks) in table format:

• PV / BCWS, EV / BCWP, AC / ACWP

•SV, SPI, CV, CPI

•Three charts from EVM report:

•Generate EVM report in Project. Change the end-date range for each chart to the status date (Sept 27th)

•Copy and paste the charts into the Word document

•Description and interpretation of EVM metrics In paragraph format:

•Report PV/ BCWS, EV / BCWP, and AC / ACWP for the project (not individual tasks or summary tasks)

•Report schedule variance (SV) to date and what that implies in terms of being ahead of or behind schedule.

•Report cost variance (CV) to date and what that implies in terms of being over or under budget

•Explain which summary tasks caused the most "damage" to this cost variance (Ignore detail tasks)

•Report schedule variance (SV) to date and what that implies in terms of being ahead of or behind schedule

•Explain which summary tasks caused the most "damage" to this schedule variance (ignore detail tasks)

•Two suggestions to get the project back on schedule and within budget

•Forecast of EAC (earned at completion) and explanation in paragraph format:

•Report BAC, EAC, and VAC given the two scenarios of continued cost-overruns at similar rates or if there are no more cost overruns after current status date.

Answers

Please note that this is a general framework for providing an answer. The specific details and values will vary depending on the project. It is important to analyze the project's data and metrics to provide accurate and relevant information.

Project Overview:
- Project Name: [Insert Project Name]
- Current Status Date: September 27.

Forecast of EAC (Earned at Completion):
- Report BAC, EAC, and VAC given two scenarios: continued cost overruns at similar rates or no more cost overruns after the current status date.

Please note that this is a general framework for providing an answer. The specific details and values will vary depending on the project. It is important to analyze the project's data and metrics to provide accurate and relevant information.

To know more about providing visit:

https://brainly.com/question/9944405

#SPJ11

if you execute a(n) _____ recursive function on a computer, the function executes until the system runs out of memory and results in an abnormal termination of the program

Answers

If you execute an unbounded recursive function on a computer, the function will continue to execute until the system runs out of memory, leading to an abnormal termination of the program.

Recursive functions are functions that call themselves within their definition. They are commonly used in programming to solve complex problems by breaking them down into smaller, more manageable subproblems. However, when a recursive function is executed without proper termination conditions or limits, it can lead to a situation known as "infinite recursion."

Infinite recursion occurs when the recursive function keeps calling itself indefinitely, consuming memory resources with each recursive call. As the function repeatedly invokes itself, the call stack grows larger and larger, eventually exceeding the available memory limit of the system. This results in a memory overflow or stack overflow error, causing the program to terminate abruptly.

To prevent abnormal program termination due to infinite recursion, it is essential to ensure that recursive functions have appropriate termination conditions. These conditions act as stopping criteria, allowing the function to exit when a specific condition is met. By defining proper base cases or termination conditions, the recursive function can end gracefully without consuming excessive memory resources.

To learn more about Recursive functions, visit:

https://brainly.com/question/25762866

#SPJ11

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11


3. Explain five (5) reasons why computers are so powerful.
the following software threats.​

Answers

Answer:

Software development brings your business to new heights of integration. It allows your company to be accessible from almost anywhere via smartphone or computer.

It improves sales and service. The way your customers experience your business is very important. Do you want them to provide you with positive feedback? Then you can’t avoid having an online platform to make it easier for them to reach your services and products.

It helps to implement on-the-go marketing, promoting your products at any place and any time without additional expenses and extra time needed. It doesn’t matter where your customers are. They can access your ads anytime and from anywhere.

It increases customers’ engagement. As with any other business, you probably want to have loyal customers. How should you increase the number of such customers? Work on online marketing strategies. Increase customers’ engagement through the website and application and make them always come back to you, not to your competitor.

Direct communication. Any other strategy can’t bring you an opportunity of direct communication with the customers at the same level as this one does. Direct communication with your customers is the fastest way to boost your brand.

Explanation:

Other Questions
you need the previous answer to tell how to do the answer. "1232". Now that that's over with, onto the question.The bakers recipe for a loaf of bread calls for 12 ounces of flour. If he uses all of his flour to make loaves of bread, how many full loaves can he bake in two weeks? an original section of dna has the base sequence 5-agcgttaccgt-3. a mutation in this dna strand results in the base sequence 5-aggcgttaccgt-3. what type of mutation does this change represent Select the correct answer.What economic concept is applied in this statement?By earning higher levels of education, students learn skills and are more likely to be employed. In their jobs, they use their skills to provide goodsand services to others. Which one of these inequalities shows x being both greater than -2 and less than 4. 6. I ran 12.2 km in 1.4 hours. Then I ran another 19.3 km uphill in 2.2 hours. What was my average speed? What does genderfluid means? can someone explain??? Which of the following best describes the solute in an aqueous solution of sodium chloride or NaC (aq)?a. Cl onlyb. Na+ and cl- c. Na+ only d. NaCl molecules green clean, a maker of home cleaning products, is considering the purchase of well heeled, a women's shoe manufacturer, for the main purpose of diversification. what might you say to the executives at green clean? 2. A sample of Cla gas has a volume of 10.0 L at a pressure of 2.00 atm and temperature of 15C. What is the pressure of the gas whon the volume and temperature of the gas are changed to thefollowing:a. 5.001 and 125Cb. 20.0 L and 0Cc. 760 mL and 250Cd. 50.0 L and 350F Joe has an idea for a new mobile restaurant business. He wants to convert an antique bus into a sit-down restaurant with a service window allowing him to serve people within the bus and walk-ups who want to get their food and take it home. Joe takes his idea and looks at the market desirability, the technical feasibility, and the business viability. Joe is performing a(n) Find the value of x. Explain the cause and effects of ocean waves when an older adult client is brought to the recovery room and presents with irregular, loud respirations, the nurse determines that this is most likely a result of: Describe the major migration flows in South Asia, and explain the relationship between migration and geopolitical conflicts in the region. PLEASE HELP!! WILL GIVE CROWN AND POINTSWhat is a current social issue we face today and what are the arguments to address them A company loses $5,400 as the result of a manufacturing defect. The 8 owners of the company must share the loss equally.Part AWhich expression shows the change in profit for each owner? A. 5,400 + 8 B. 5,400 8 C. 5,400 8 D. 5,400 8Part BFind the change in profit in dollars for each owner. A. 43,200 B. 675 C. 675 D. 5,392 Consist of hollow tubes which provide support for the cell and tracks for organelles to move on. To bake a cake I used 150 grams of flour, 70 grams of sugar, and 45 grams of milk. After going through a chemical change by baking the ingredients to make the cake, how many grams will the cake weigh? Will it be more, less, or equal to what we started with? Explain. Work out the equation of the line which has a gradient of 1/2 and passes through the point (4 -2). poetic devices in this once was a love poem