________ are intangible products that we pay for and use but never own
A) Consumer goods
B) Services
C) Industrial goods
D) E-commerce products
E) Value products
B
You might also like to view...
When thieves use your name and good credit rating to get cash or buy things, it is known as
A. personal data theft. B. credit mishandling. C. identity theft. D. credit exploitation. E. misuse of standing.
Of the three different strategic approaches to negotiation (interests, rights, and power), negotiators focus on ________ when they use threats or other means to try to coerce the other party into making concessions.
Fill in the blank(s) with the appropriate word(s).
Which of the following is a function of silence?
a. To prevent communication b. To communicate feelings c. To communicate nothing d. To provide thinking time e. All of the above
In the service-profit chain, customer satisfaction leads to customer loyalty, and results in ________.
A. changes in the organizational structure B. competitive retaliation based on service strategy C. revenue growth and profitability D. external service value E. competitive intelligence for future growth