1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ololo11 [35]
3 years ago
5

1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly

and publicly available for use in emergencies. A) Social networking B) Crowdsourcing C) Crisis-mapping D) Affective computing
Computers and Technology
1 answer:
devlian [24]3 years ago
8 0

Answer: C) Crisis- mapping

Explanation:

Crisis mapping gather all the information from different sources like e-mail, tweets and text messages.

It makes the information and data publicly available for use in many emergencies. it also analysis the data and display it during crisis.

The advantage of this method is that it basically increases the awareness among all the public so that they can easily report the information and improve the data management.  

Therefore, Option (C) is correct.

You might be interested in
Question 7 * What is the default powerpoint standard layout A Blank B Title slide C Title only D. Comparison ​
lesantik [10]

Answer:

B. <u>Title</u><u> </u><u>slide</u><u> </u>layout is the default PowerPoint standard layout.

3 0
2 years ago
How do i delete a question ?
seraphim [82]

i think we can't do that

7 0
3 years ago
Suggest ways in which web designers can use color to make a statement about the subject of a web page, a brand, or the website i
Ulleksa [173]

Hi. :")

As it is used to attract interest in advertisements, different colors can be used in order to attract attention here. Or the upper left corner technique can be used. The important contents are placed in the upper left corner. Because, in the country where I live, in the technology design class, people have always studied the upper left corner further.

Good Luck!

#Turkey

4 0
3 years ago
What are the best programming languages of 2020 for beginners?<br>​
jek_recluse [69]
Probably skript! Up to you though
8 0
3 years ago
Read 2 more answers
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them?
MrMuchimi

Hexadecimal numbers are just a convenient representation of binary data. When entered as text, they consist of ASCII characters 0-9 and a-f. The numbers will then have to be converted to binary. This is accomplished by converting to uppercase, subtracting the ASCII offset (48 for 0-9 or 55 for A-F), so that the result is a number between 0 and 15 (inclusive). This can be stored in computer memory to represent 4 bits.

Hexadecimal numbers represent binary numbers in the following way:

hex | binary

0 = 0000

1 = 0001

2 = 0010

3 = 0011

4 = 0100

5 = 0101

6 = 0110

7 = 0111

8 = 1000

9 = 1001

a = 1010

b = 1011

c = 1100

d = 1101

e = 1110

f = 1111

As you can see, no other 4 bit combination exists.



5 0
4 years ago
Other questions:
  • If memory accesses take 100 times more than register accesses, then a LOAD instruction will take ___ machine cycles than an ADD
    7·1 answer
  • g Create your own data file consisting of integer, double or String values. Create your own unique Java application to read all
    7·1 answer
  • My 2 in 1 laptop/tablet
    13·1 answer
  • A security analyst believes an employee's workstation has been compromised. The analyst reviews the system logs, but does not fi
    7·2 answers
  • If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?
    13·1 answer
  • What is the best way to get the most out of the box?
    14·2 answers
  • 6 → What is the difference between SHA-256 and SHA-512?
    12·1 answer
  • Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your ch
    8·1 answer
  • What are the steps to configure user information in a document?
    5·2 answers
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!