1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
13

What is the difference between information poor and information rich​

Computers and Technology
1 answer:
maw [93]3 years ago
6 0

Answer:

The “Information poor” are consumers who use traditional mass media information such as television, DVDs, radios and magazines. ... On the opposite “information rich” stands for a new elite within the information society.

Explanation:

You might be interested in
From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 < 8 true
Ksenya-84 [330]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

7 0
4 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which section available in the Design view for the form actually include
Archy [21]

Answer:

the answer is detail

Explanation:

please it's detail

8 0
3 years ago
Which are two common methods a laptop uses to get an Internet connection over a cellular network?
Vikentia [17]
Wi-Fi or Tethering.
8 0
3 years ago
Hub is a _________ device and switch is a ________ device.
Galina-37 [17]
The answer is B) broadcast, unicast
Hub is a broadcasting device and switch is a uni-casting device.
4 0
3 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • GUI stands for "___ user interface."
    9·2 answers
  • Does it matter if watch comes without box and papers
    10·1 answer
  • How do you create a logo on Adobe illustrator
    8·1 answer
  • Explain the term DNS(Domain Name System) and why it is used.
    9·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow across a long row of data. Sam would like to make
    8·2 answers
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • A printer would be considered _____. Select 2 options. 1 an input device 2 an output device 3 hardware 4 software 5 storage
    10·1 answer
  • PLEASE FASTTTTT
    8·2 answers
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!