1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
2 years ago
8

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and

publicly available for use in emergencies.
Computers and Technology
1 answer:
Nataly [62]2 years ago
7 0
Crisis mapping tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. These tools analyze data at a time of crisis, e.g. disasters, social or political conflicts, to promote awareness and management for the public.
You might be interested in
Wendy has to capture a sculpture in the middle of the park at night. She is not able to get the entire sculpture into focus in o
dsp73

Answer:

Focus Stacking

Explanation:

F-stop stacking which is also referred to as image stacking is a powerful technique that improves the quality of an image by stacking images taken at different f-stops in order to improve corner sharpness and overcome blurriness. Once photographs are taken at different f-stops (focus stops), a final complete composite picture is created using only the sharpest portions of the photograph.

6 0
3 years ago
Write an awk script that produces a report from an input file. The report summarizes sales data as recorded for sales stations.
Hatshy [7]

Answer:

Script is given below

Explanation:

Below is the AWK code for the Report.I have used the sample data that your have shared in the question.

AWK code-

echo "Hello World!"

echo "2011 Jan X 29.44 17.33 43.21" > inputfile.txt

echo "2014 Jan Y 32.32 12.12 99.00 1.99 " >> inputfile.txt

echo "2012 Jan X 321.11 12.34 10.99" >> inputfile.txt

echo "2012 Feb Y 1.99 12.75" >> inputfile.txt

echo "2012 Feb X 32.99 65.78 98.76" >> inputfile.txt

echo "2014 Jan Y 12.99 17.44 21.34" >> inputfile.txt

echo "2012 Mar X 11.45" >> inputfile.txt

awk -F" " 'BEGIN{ X_sum=0;

print(" Sales Data for year 2014")

print("========================")

}

{ if($1=="2014")

{

print($2,":", $4+$5+$6+$7+$8+$9+$10+$11+$12+$13)

}

if($3=="X")

{

X_sum=X_sum+$4+$5+$6+$7+$8+$9+$10+$11+$12+$13

}

if($3=="Y")

{

Y_sum=Y_sum+$4+$5+$6+$7+$8+$9+$10+$11+$12+$13

}

if($3=="Z")

{

Z_sum=Z_sum+$4+$5+$6+$7+$8+$9+$10+$11+$12+$13

}

 

}

END { print(" ========================")

print("Station volume for 2014 is:")

print("X:" ,X_sum )

print("Y:" ,Y_sum )

print("Z:" ,Z_sum )

}

' < inputfile.txt

8 0
3 years ago
How can a PowerPoint user add a shadow to a table
damaskus [11]
Https://wordribbon.tips.net/T010192_Drop_Shadows_for_Tables.html
8 0
3 years ago
List 2 end to end test commands. <br><br> Will mark Brainliest!!
Delvig [45]

Answer:

ibm pll

Explanation:

4 0
2 years ago
Which of the following is not recommended? A. Vehicle occupants should wear both lap and shoulder belts. B. Vehicle occupants sh
MA_775_DIABLO [31]
C. children 13 and under
4 0
3 years ago
Other questions:
  • Which of these is not one of the main parts of an email?
    10·2 answers
  • Universal Containers needs to add an additional recipient to a workflow email alert that isfired from the case object. What type
    6·1 answer
  • What is the benefit of a cloud computing infrastructure? ○ Companies have full control over the data that is hosted. ○ Companies
    11·1 answer
  • Write a program that uses an "if" statement to determine if the number is greater than one. If the number is greater than 1, the
    9·1 answer
  • Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
    9·1 answer
  • 1. Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
    6·1 answer
  • How to cheat on asseeprep
    6·1 answer
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
  • The tools, skills, knowledge, and machines created and used by humans is known as.
    13·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!