1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babymother [125]
3 years ago
6

When the minnesota timberwolves encouraged facebook fans to post a great shot of a dunk onto its pinterest page for a chance to

win tickets to a game, which dimension of the 4e framework was being targeted?
Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
7 0

Excite the customers

Different kinds of social media related offers are used by many marketers to excite the customer. These include games and mobile applications to get the client excited about a brand, product, company, or an idea. They actively use Facebook, Google+ or Pinterest to give out offers and great deals that are likely to excite.

You might be interested in
Terms that represents the achual speed used by device to transfer data​
lina2011 [118]

Answer:Mb/s

Explanation:

megabytes per second

3 0
3 years ago
______involves encoding information using fewer bits than the original representation Group of answer choices
stepan [7]

Answer:

The answer is "Data compression".

Explanation:

In the given question some information is missing, that is the option of the question, which can be described as follows:  

a) Data mining.

b) Information theory.

c) Data compression.

d) Image reconstruction.

Data compression is the mechanism, in which the bits arranges the data, that is changed. It encodes data, which needs less space is on the drive. It reduces the information instances and storage capacity, and other choices were wrong, which can be described as follows:

  • In option a, Data mining is used in row data searching, that's why it's not correct.
  • In option b, Information theory is used in communication, that's why it is wrong.
  • In option d, Image reconstruction is used in 3D design, that's why it is wrong.
5 0
3 years ago
2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
True [87]

Answer:

Follows are the explanation of the choices:

Explanation:

Following are the Pseudocode for selection sort:                      

for j = 0 to k-1 do:

      SS = i

      For l = i + 1 to k-1 do:

        If X(l) < X(SS)

          SS= l

        End-If

      End-For

      T = X(j)

      X(j) = X(SS)

      X(SS) = T

    End-For

Following are the description of Loop invariants:

The subarray  A[1..j−1] includes the lowest of the j−1 components, ordered into a non-decreasing order, only at beginning of the iteration of its outer for loop.  

A[min] is the least amount in subarray A[j.. l−1] only at beginning of the each loop-inner iterations.                      

Following are the explanation for third question:

Throughout the final step, two elements were left to evaluate their algorithm. Its smaller in A[k-1] would be placed as well as the larger in A[k]. One last is the large and medium component of its sequence because most and the last two components an outer loop invariant has been filtered by the previous version. When we do this n times, its end is a repetitive, one element-sorting phase.

Following is the description of choosing best-case and worst-case in run- time:

The body the if has never been activated whenever the best case time is the list is resolved. This number of transactions are especially in comparison also as a procedure, that will be (n-1)(((n+2)/2)+4).    

A structure iterator at every point in the worst case that array is reversed, that doubles its sequence of iterations in the inner loop, that is:(n−1)(n+6) Since both of them take timeΘ(n2).

7 0
3 years ago
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
STatiana [176]
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
3 0
3 years ago
Read 2 more answers
WHAT THE DEFINITION OD ENGINEER. No CHEAT
Harrizon [31]
A person who designs, maintains or builds machines.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Describe three main types of testing and the order in which they are performed.
    9·2 answers
  • Help me on this question
    14·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
    7·2 answers
  • The clear emergence of a leader and the development of group norms and cohesiveness are the key indicators of the ________ stage
    6·1 answer
  • Why is the cyber community important???
    8·2 answers
  • 2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
    7·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!