1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
6

Social media sites like stuffdot are often classified based on two factors; self-disclosure and ________

Computers and Technology
1 answer:
Artist 52 [7]3 years ago
8 0

Answer:

The answer to this question is "Media Richness".

Explanation:

Media Richness is a theory, that says Media has the power to convey the information that is needed in communication. This depends on whether uncertain times which type of data will be used, which is explained by the Mass Communication.  

  • Media Richness is the amount in which two social members make audio, visual and private interaction.
  • It provides face to face communication that was released in 1987 which ranks this as the richest channel for mediated communication.
You might be interested in
Which of the following defines a network
MrRissso [65]
A network, in computing, is a group of two or more devices or nodes that can communicate. The devices or nodes in question can be connected by physical or wireless connections. The key is that there are at least two separate components, and they are connected.
5 0
3 years ago
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
weqwewe [10]

int main() {

string simon_Pattern;

string user_Pattern;

int userScore;

int i;

user_Score = 0;

simon_Pattern = "RRGBRYYBGY";

user_Pattern = "RRGBBRYBGY";

for (i = 0; i <= simson_pattern.length; i++) {

if (simon_Pattern[i] == user_Pattern[i]) {

user_Score = user_Score + 1;

} else {

break;

}

}

cout << "userScore: " << user_Score << endl;

return 0;

}

Here it uses two string variable to store “simson’s pattern and user’s pattern”. Then a “for loop” is executed till the end of the string. Inside the for loop both the strings are compared character by character and when found the score is added. If not for loop is exited and finally the score is displayed.

5 0
3 years ago
Read 2 more answers
-Convert the 1's complement 10111010 to decimal
frez [133]

Answer:

69

Explanation:

We are given a 1's complement of a number.So to convert it to the original number we have again take the 1's complement of the given 1's complement to convert it to the original number.We can do that by converting all 0's to 1's adn all 1's to 0's.

1's complement= 10111010

original number=01000101

Then to convert the binary number to the decimal number we have multiply each bit with the respective exponent of 2.The exponent of the LSB is 0 and it increases as we move to MSB by 1.

So the calculations are as  following:-

(01000101)₂ = (0 × 2⁷) + (1 × 2⁶) + (0 × 2⁵) + (0 × 2⁴) + (0 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2⁰) = (69)₁₀

7 0
3 years ago
Read 2 more answers
Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
Alla [95]

Answer:

The type of attack is <em>Phising Email.</em>

<em />

Explanation:

Phishing emails are mails purportedly sent by a company staff seeking some vital information from an employee or employees. Criminals often use such method to get sensitive information about a company and its details from its own employees who may not be able to differentiate such mails from the normal company mails. Thus the mail that Jerry receives regarding a new update the administrators of his company intends to implement can be regarded as a Phishing email.

5 0
3 years ago
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
Other questions:
  • End-user development: the process by which an organization's non-it specialists create software applications.
    8·1 answer
  • is a specific system for gathering information from a single group of respondents by continuously monitoring the advertising, pr
    13·1 answer
  • Shortcuts can help you complete spreadsheet tasks more efficiently. True False?
    7·2 answers
  • what is the primary way to access applications in windows 8? a. control panel b. start menu c. desktop tiles d. context menu
    7·1 answer
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • Which of the following is NOT a good way to treat an EPA or OSHA inspector?
    15·2 answers
  • How many types of sharing of Google Forms are possible?
    15·1 answer
  • How do you mark answers brainliest?<br> it looks like they changed it and now idk how to
    12·1 answer
  • Using C++
    13·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!