1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
2 years ago
9

What is information richness?

Computers and Technology
1 answer:
mrs_skeptik [129]2 years ago
4 0

d. Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

<h3>Information richness</h3>

Information richness refers to the amount of sensory input available during communication. For example, <u>talking to co-workers in a monotone voice without varying pace or gestures is not a very enriching experience</u>. On the other hand, using gestures, tone of voice, and pace of speech to convey meaning beyond the words themselves promotes richer communication. Different channels have different information wealth.

Information-rich channels convey more non-verbal information. For example, a face-to-face conversation is richer than a phone call, but a phone call is richer than an email. Research shows that effective managers are more likely to use informative channels of communication than ineffective managers.

Learn more about Note-making Information: brainly.com/question/1299137

#SPJ4

You might be interested in
What kind of animation is used in the powerpuff girls show??
konstantin123 [22]
Calarts? Cartoon I don’t really know but that’s all the information that I have
8 0
3 years ago
When pasting a circle drawn by the presentation software drawing tool into a spreadsheet, that circle will go into the selected
ivann1987 [24]
The answer is ............................ False
6 0
3 years ago
Read 2 more answers
Password ____ traverse the network searching for passwords from remote authentication systems.
irga5000 [103]

The correct answer is scanners.

<h3>what is password?</h3>

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

When a password contains more than one word, it may be referred to as a passphrase. When a password contains solely digits, such as a personal identification number, it may be referred to as a passcode or passkey (PIN).

learn more about password refer:

brainly.com/question/15569196

#SPJ4

3 0
2 years ago
In which technique does a group rate or rank a set of information, compile the results and repeat until everyone is satisfied wi
garik1379 [7]
The correct option is DELPHI. Delphi technique is a structured and systematic method used in forecasting. The method often involve sending several rounds of questionnaires to experts. The anonymous responses are then gathered together and shared with the concerned group after each round of answers are received. 
5 0
3 years ago
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
BabaBlast [244]

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

5 0
3 years ago
Other questions:
  • A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification
    15·1 answer
  • What are some local storage devices?​
    6·1 answer
  • The state department that issues driver's licenses would like a police officer to be able to scan the driver's license and insta
    12·1 answer
  • Which view of data deals with how the data is actually formatted and located? physical view logical view information view techni
    12·1 answer
  • 3k means about 3 thousand bytes. how would you express two hundred million bytes? .
    8·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies
    9·2 answers
  • When the atmosphere has too much carbon dioxide in it, the oceans absorb some of it to achieve a new balance. This is an example
    9·2 answers
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!