1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
15

When identifying who will send a presentation, what are the two types of audiences? ​

Computers and Technology
1 answer:
Virty [35]3 years ago
5 0

Answer:

Explanation:Demographic audience analysis focuses on group memberships of audience members. Another element of audience is psychographic information, which focuses on audience attitudes, beliefs, and values. Situational analysis of the occasion, physical setting, and other factors are also critical to effective audience analysis.

You might be interested in
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
Using selection sort, how many times longer will sorting a list of 40 elements take compared to a list of 5 elements
Hoochie [10]

It will take 8 times more time to sort a 40-element list compared to the time spent on a 5-element list.

We can arrive at this answer as follows:

  • We can see that if we divide a group of 40 elements into groups containing 5 elements, we will have 8 groups.
  • In this case, the time it would take to sort the list of one group of 5 elements would be repeated 8 times so that we could sort all the groups and their elements.

Another way to do this is to divide the number 40 by 5. We would have the number 8 as a result, which indicates that we would need 8 times more time to sort a list of 40 elements, compared to a list of 5 elements.

You can get more information about lists at this link:

brainly.com/question/4757050

5 0
3 years ago
________ is a suite of protocols designed to connect sites securely using ip networks.
a_sh-v [17]
IPSec


Hope that helps, Good luck!! (:
7 0
4 years ago
Read 2 more answers
What information does a Transform hold? (Choose all that apply)
never [62]

Answer:

Each object stores its position, orientation, and scale values.

Explanation:

5 0
4 years ago
How to check iready minutes when i cannot log into iready
Alekssandra [29.7K]

Answer:

If you are the host of the iready like a teacher then you should be able to see how much time you have left. If not you should probably ask them.

Explanation:

3 0
3 years ago
Other questions:
  • Are the advantages of a climate control in a vehicle
    10·2 answers
  • Give an example of Digital Convergence.
    5·1 answer
  • Java Question-5 Declare and initialize two variables called first and second. Write a single statement that will print the messa
    15·1 answer
  • The following SQL statement contains which type of subquery? SELECT title FROM books WHERE EXISTS (SELECT isbn FROM orderitems W
    14·1 answer
  • As your textbook explains, Wikipedia is usually the only source you need when
    8·1 answer
  • Which of the following is categorized as an indirect payment
    9·1 answer
  • No links it’s just a normal question about iPhones.
    13·1 answer
  • A specific type of computer program that manages the other programs on a computer
    6·1 answer
  • What are 15 importance of information processing cycle?
    14·2 answers
  • Television, the internet, and smartphones are different communication _______blank hsn uses in its imc.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!