1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
8

Search and read all phenomenon listed below and identify the ICT platform they used.

Computers and Technology
1 answer:
Amanda [17]3 years ago
6 0

Answer:

1. Radio broadcast

2. Text brigades

3. Social media and change website

4. Internet and text brigades

Explanation:

I'm having issues posting my answer. Please go through the attachment.

Answer:

1. Radio broadcast

2. Text brigade

3. Social media and change website

4. Internet and text brigades

Explanation:

ICT can serve as a medium through which change can be effected in a society.

1 EDSA and cardinal

The ICT used here was the radio.

2. EDSA dos

The ICT that was used her was the text brigades.

3. Million people march

The ICT used here was social media and the change website.

4. ICT used here is internet and text messaging.

Please I have provided background information to what caused these events. I typed my answers but the editor did not allow me post it.

Thank you.

You might be interested in
How many passes will it take to find 30 using a binary search?
dimulka [17.4K]
Just wanna let you know I could be wrong but I think 4 passes
7 0
3 years ago
Uinjsiodj9fijsdiokjdwe0okakj09dw9j09jw09
erica [24]

Answer:

hi

Explanation:

hii

3 0
3 years ago
Read 2 more answers
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
melamori03 [73]

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

<h3>What are some ways to handle against email phishing attacks?</h3>

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

  • Be on guard towards the  handing of sensitive information.
  • Never click on alarming messages.
  • Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

brainly.com/question/2537406

8 0
2 years ago
Since the actions in a textual storyboard are often very close to actual program code, the statements in a textual storyboard ar
Kaylis [27]

Answer: Pseudo code

Explanation:Pseudo code is a false code that is written in the textual story board to make the fictional plot of the story more understandable in the layman terms for everyone.This is done to increase the readability of the code , which cannot be understood easily by the actual code.

It is implemented on the algorithms of a program in computer field so that the complex coding statements can be understood by the programmer.

7 0
3 years ago
What paper should I use for technical drawing?
Vitek1552 [10]

Answer:

classic A4 format, and therefore for 210 x 297 mm sheets

7 0
3 years ago
Other questions:
  • Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did no
    14·2 answers
  • Which option is referred to by the Animals tag?
    5·1 answer
  • 12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)
    15·2 answers
  • The negotiators past relationship will affect current behavior if the parties
    12·1 answer
  • Data warehousing and data mining mean the same thing when applied to CRM
    7·2 answers
  • 3. What is the purpose of the conclusion in an expository essay? (1 point)
    8·2 answers
  • _____ separation strategies (e.g., attacking and sabotaging others) are used by those for whom co-cultural segregation is an imp
    5·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
    12·1 answer
  • Explain impact of modern technology on human life​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!