1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
10

The use of an information system to support the sharing of content among networks of users related by common interests is termed

​ __________.
A. media networks
B. online communities
C. common media systems
D. social networks
E. social media information systems
Computers and Technology
1 answer:
lubasha [3.4K]3 years ago
5 0

Answer:

The answer is E, Social media information system.

Explanation:

What makes the answer unique is the fact that the system only supports information shared within a specific group of local network users.

By definition, Social media information system is an information technology tool that assists in the reversible distribution of information or digital content among people of like and similar network.

You might be interested in
Decision making process
Zanzabum
Choice is the answer you want 
7 0
3 years ago
Discuss how and why video game hardware affects game design and where you think the next generation of platforms will change tho
katovenus [111]
Ever since video games were first released, graphics have been a huge selling point for popular games. On today's market, most new AAA titles (games with the largest available budget) are focused on improving graphics over previous AAA titles. But improvements in graphics requires a more difficult calculation for the computer hardware. When working with high resolution textures, the hardware need to be able to load in assets faster than ever and since there are physical limitations to how fast these assets can be loaded by the hardware, game designers have to limit their assets size. Without limitations most hardware wouldn't be able to handle the ever growing size of assets. So a game designer is limited by the power of the current hardware when designing assets. However since improvements are made every year on hardware, improvements in graphics quality and the like can also be made but will be limited to the hardware limitations of the future hardware. On a side note, virtual reality graphics were hard to render at a decent resolution a couple of years ago due to hardware limitations. But with the improvement in hardware came also the improvements in resolution and responsiveness of the virtual reality experience. Another aspect of video hardware is also the graphics drivers, compatibility, game engine and much more, but these are the basics of why hardware affects game design.
6 0
3 years ago
Jack and Diane are creating each ClassID following this pattern: first two letters of ClassName (one uppercase, one lowercase),
Norma-Jean [14]

Answer:

i dont know 123 IdK

Explanation:

6 0
4 years ago
What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
Romashka [77]

The diagram part of the question is incomplete but the mathematical part has been solved below for you . However when the diagram will be attached it will be answered too.

Answer:

Following is the solution for the Time complexity/ Run Time:

Given that:

A = N/2 to 1

B = 1 to 4N

By summation:

Time Complexity = Lower bound of A * Upper Bound of B

Time Complexity = (N/2) * (4N)

By simplifying:

Time Complexity = N * 2N

Time Complexity = 2N^2

Hence the runtime f(n) for given pseudocode will be 2N^2

i hope it will help you!

3 0
3 years ago
QUIZLET Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer networ
anastassius [24]

Answer:Screening

Explanation:Packet screening is the process in which whenever a packet is received at the destination port, there is the examining of the packet.The examination of the packet rote from source to destination takes place. The screening takes place for evaluating that the data in the packet is adequate and carries no error that can risk in the security, tracks the routes  of the packet path etc.

5 0
3 years ago
Other questions:
  • Write a program that prompts the user for the shift value (e.g. 3) and then a plain-text message to encode. Encrypt the message
    5·1 answer
  • A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
    8·1 answer
  • python An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase an
    14·2 answers
  • When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web
    11·1 answer
  • What does RFID use for wireless communication?<br> Infrared<br> IoT<br> Smart chip<br> Tag
    14·1 answer
  • What tasks should a laptop accomplish?
    15·1 answer
  • What is suitable equipment to meet customer needs from
    10·1 answer
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
  • EEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIIIIIIIIIIIIIII
    9·2 answers
  • When the narrator of "EPIC 2015" describes the year 2015 as the "worst of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!