1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
1 year ago
10

Alice is watching a speech over the internet. what type of message is alice attending to?

Computers and Technology
1 answer:
Vilka [71]1 year ago
4 0

The  type of message is allice attending on the internet is known to be called a mediated message.

<h3>What is a mediated message?</h3>

Mediated communication is known to be a term that is often called a mediated interaction or a mediated discourse.

It is seen as a term that connote the act of  communication done by the use of information communication technology and can be different from face-to-face talking.

Hence, The  type of message is allice attending on the internet is known to be called a mediated message.

Learn more about web message from

brainly.com/question/28206700

#SPJ1

You might be interested in
_______ is the type of vision useful in sensing motion and objects outside normal vision.
Likurg_2 [28]

The answer is peripheral vision, also known as side vision.

3 0
3 years ago
(On Python/ Edhesive) Test if a date is a payday based on the day of the month (15th or the 30th).
Mazyrski [523]

Answer:

day = input("Enter today's day numerically: ")

if "15" in day or "30" in day:

print("It's payday!")

else:

print("Sorry, not a payday.")

Explanation:

Ask the user what day it is and store it in a variable called, day. Write a simple if else statement to check if ut is payday or not. This program can be more advanced by having payday be a variable.

7 0
3 years ago
A B-tree can be ____ in three ways: inorder, preorder, and postorder.
Harman [31]

Answer:

traversed

Explanation:

B-tree is a self balancing tree and it is a data structure which allows insertion, deletion operations.

inorder, preorder and post order, they all are traversing algorithms in the tree data structure.

inorder: first print left, then root and then right.

preorder: first print root, then left and then right.

postorder: first print left, then right and then root.

Therefore, the answer is traversed.

4 0
3 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
If a work is in the public domain… Group of answer choices its copyright has expired. it may not be used for commercial purposes
ArbitrLikvidat [17]

Answer:

its copyright has expired

Explanation:

If a work is in the public domain it means that it's copyrighte has been expired.

After the period of copyright protection has expired, a work becomes available for use without permission from the copyright owner; it is now said to be  "in the public domain." Most works enter the public domain because their copyrights have expired.

3 0
3 years ago
Other questions:
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • To rehearse giving a PowerPoint presentation, Hema would like to print out the presentation with all of the speaker notes. Hema
    10·1 answer
  • Use knowledge of the actions and adverse effects of NSAIDs to choose the correct statement.
    13·1 answer
  • Which is the fastest CPU and why?
    5·1 answer
  • Which plays the most important role in providing ease of access to a web app?
    12·1 answer
  • I need the answer ASAP. I’ll mark brainliest if right
    5·1 answer
  • What is the depth of the following tree?
    10·1 answer
  • STOP DELETING MY ANSWERS AND QUESTIONS!!!!!!!
    9·1 answer
  • A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!