1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
1 year ago
9

What is information richness?

Computers and Technology
1 answer:
mrs_skeptik [129]1 year ago
4 0

d. Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

<h3>Information richness</h3>

Information richness refers to the amount of sensory input available during communication. For example, <u>talking to co-workers in a monotone voice without varying pace or gestures is not a very enriching experience</u>. On the other hand, using gestures, tone of voice, and pace of speech to convey meaning beyond the words themselves promotes richer communication. Different channels have different information wealth.

Information-rich channels convey more non-verbal information. For example, a face-to-face conversation is richer than a phone call, but a phone call is richer than an email. Research shows that effective managers are more likely to use informative channels of communication than ineffective managers.

Learn more about Note-making Information: brainly.com/question/1299137

#SPJ4

You might be interested in
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
When would it be necessary to shoot in 4K according to the presentation?
Nataly_w [17]

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

6 0
2 years ago
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
antiseptic1488 [7]

Answer:

The tool that allows to configure a custom console is "mmc.exe".

Explanation:

MMC is a Microsoft Management Console. It is used to customize the management console and add the tools in console that are required by the technician.

3 0
3 years ago
Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
Igoryamba

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

3 0
2 years ago
To copy and paste the image in MS Word the dash option is used​
Stells [14]

<em>ur</em><em> </em><em>answer</em><em> </em><em>hope</em><em> </em><em>this</em><em> </em><em>will</em><em> </em><em>helps</em><em> </em><em>u</em><em /><em /><em /><em /><em />

5 0
2 years ago
Other questions:
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • I've this assignment due before 7 am. Please help, me.
    9·1 answer
  • My computer have black spots and line
    7·2 answers
  • Which cisco ios command is used to display the current ospf neighbors and their rids?
    11·1 answer
  • Chemical reaction rates are proportional to a rate constant, k, which changes with temperature according to the Arrhenius equati
    14·1 answer
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • Why is it important to cite your sources?
    8·2 answers
  • In presentation software, what is the way that text and pictures are arranged on a page called?
    10·1 answer
  • Using Phyton
    9·1 answer
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!