1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
5

To distinguish advertising, which typically is conveyed via print, TV, radio, the Internet, etc., from person-to-person forms of

communication, including personal selling and word of mouth, the term _____ communication is used
Computers and Technology
2 answers:
neonofarm [45]3 years ago
3 0

Answer: Mediated

Explanation:

 Mediated communication is the type of communication in which the information are carried out so that it can be used in various types of communication technology.

It is also known as mediated interaction and it can be used as face to face communication.

The mediated communication are typically used to distinguish the various form of communication. The mediated communication are not only computerized but also we can communication by using pen and paper.  

fenix001 [56]3 years ago
3 0

Answer:

Mediated communication is the correct answer.

Explanation:

The term mediated communication, also known as mediated interaction and less common, mediated discourse, refers to communication carried out by the use of information communication technology and it is different from face-to-face communication. Some examples are TV, radio, the Internet and advertising.

You might be interested in
What happened to the ten commandments tablets.
nignag [31]

Answer:

they got destroyed

Explanation:

whenwhen Moses came back from the mountain was angry when he saw the people worshipping Idols who threw down the tablets and broke them

7 0
3 years ago
Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply loo
shepuryov [24]
Using a database of precomputed hashes from sequentially calculated passwords called a rainbow table, an attacker can simply look up a hashed password and read out the text version. Each column in the rainbow table uses a different reduction function. The function of the table is <span>reversing cryptographic hash functions. </span>
5 0
3 years ago
You could be electrocuted if you try to use water to put out a
Tanzania [10]
The answer is A. class C fire.

A class C fire involves energized electrical equipment.
Examples are: appliances, car motors, etc.
3 0
3 years ago
Read 2 more answers
Write a program to compute the maximum and minimum value of three numbers:
nexus9112 [7]

Answer:

in javascript:

function compute(a, b, c){

let array = [a, b, c];

array.forEach((e,k) => {

if(e >= a && e >= b && e >= c){

console.log("maximum: " + e);

}  

if( e <= a && e <= b && e <= c){

console.log("minimum: " + e);

}

}

}

Explanation:

7 0
3 years ago
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • "list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment."
    15·1 answer
  • Computer design replaced ______________
    6·1 answer
  • When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
    6·1 answer
  • During which phase of the website transformation processwould the project team for developing perform content analysis, layout t
    13·1 answer
  • What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; voi
    6·1 answer
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • The first page of a website is what?​
    5·2 answers
  • "Bookings are to be stored in three separate
    7·1 answer
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!