1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
9

The informative strategy of ________ goes beyond reporting, providing listeners with a deeper understanding of events, people, a

nd policies.
Computers and Technology
2 answers:
alex41 [277]3 years ago
8 0
The informative strategy of <span>explaining goes beyond reporting, providing listeners with a deeper understanding of event, people, and polices.</span> 


<span>Explaining means to make something clear to someone ( giving it more detail ).</span>
VMariaS [17]3 years ago
8 0
<h2>Answer:</h2><h3>Explaining.</h3><h2>Explanation:</h2>

An explanatory strategy is one in which the one providing the source of information goes into detail, describing the specifics of the topic. Rather than just stating the information and leaving it to the listeners in an explanatory strategy the information provider goes to greater lengths in defining the said information, so that the audience receives exactly the same information that the provider intends and thereby makes sure that there is minimal loss of information propagation.

You might be interested in
How many bytes make up a megabyte? One hundred One thousand One million One billion
Phoenix [80]
One million is the answer.
4 0
4 years ago
Rward
Harlamova29_29 [7]

The toolset combination that has the potential to provide the complete end to end solution is Kore.ai, Smart Analytics, IKON, Dynatrace, and Remedy. Dynatrace is a monitoring platform.

The Kore.ai refers to a “no-code” platform used for the design, build, host and deployment of AI-rich assistants.

Dynatrace can be defined as a useful software intelligence platform used to accelerate digital transformation.

Remedy nowadays represents the Service Management Business Unit of BMC Software.

Learn more about toolset combination here:

brainly.com/question/14364696

7 0
3 years ago
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
4 years ago
The portion of memory that is more or less permanent is called __________ memory.
lisabon 2012 [21]

The portion of memory that is more or less permanent is called <u>long term memory.</u>

<u></u>

<h3>What is Long-term memory?</h3>

Long-term memory guides to the memory process in the brain that takes knowledge from the short-term memory store and creates long-lasting memories. These recollections can be from an hour ago or several decades ago. Long-term memory can hold an unlimited amount of knowledge for an indefinite period of time.

<h3>What is long-term memory in psychology?</h3>

Long-term memory refers to unlimited storage information to be carried for long periods, even for life. There are two types of long-term memory: declarative or direct memory and non-declarative or implicit memory. Direct memory refers to information that can be consciously evoked.

To learn more about Long-term memory, refer

brainly.com/question/25040884

#SPJ4

6 0
2 years ago
How to delete a brainly account?
dmitriy555 [2]

Answer:

Fill the deletion form go to settings and open FAQ ..

7 0
3 years ago
Read 2 more answers
Other questions:
  • Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
    9·1 answer
  • What kind of voltage do solar cells generate? Solar cells produce ______ voltage which is not usable by most household appliance
    15·1 answer
  • Which two factors mainly affect ocean tides on earth?
    7·1 answer
  • Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
    15·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • Please someone do this for me and send a screenshot i really need it for my exams pleaseeee :(<br>​
    10·1 answer
  • How many 2/8 pound patties can she make from 7/8 of a pound of hamburger
    10·1 answer
  • What is the future of web development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!