Which event represents an example of social media being used in an
emergency situation?
A. The spread of information regarding climate change
O B. The spread of video footage showing a man's murder by a police
officer in 2020
C. The political protests held in several Arab countries in the early
2010s
D. Communication with friends and family after other systems were
disabled by a major earthquake

Answers

Answer 1
Hello!

The answer is:
-D. Communication with friends and family after other systems were disabled by a major earthquake.

I hope this helps you! :)

Related Questions

In a typical information security program, what is the primary responsibility of information (data) owner

Answers

The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.

What is an information security program?

The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.

Find out more information about information security.

brainly.com/question/25226643

One way to insert a page break is to choose page break from the Insert tab.

true or false

Answers

true that is a way to insert a page break

Janis is working on a project on a project with some classmates. Which word processing features can they use while authoring the project report

Answers

Answer:

Use the word project

Explanation:

Its just a guess

Janis will use the word project for authoring the project report.

What is Project Report?

A project report is a document that provides information on the general state of the project or particular aspects of its performance. Regardless of the report type, it includes project data based on managerial, technical, financial, economic, or production elements.

Writing a project report helps you identify and comprehend the requirements for the success of your project. It makes your ideas clear to you.

Any firm needs information from a variety of sources, including technical, financial, economic, production, and managerial information. They are important during the inception, growth, and expansion phases of a business.

To know more about Project Report follow the link.

https://brainly.com/question/6905384

#SPJ5

Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.

Answers

The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

What is power point presentation?

Power point presentation is a softwere which display the data with the help of collection of slides.

Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.

Form the main view to access her presentation, Isabela need to follow the following steps-

Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.

Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

Learn more about the power point presentation here;

https://brainly.com/question/24653274

Answer: It’s B, Click the File tab, and click the open option

Explanation:

just got it right on edge

Please help me on this it’s due now

Answers

Bottom right goes first then top right for the second part!

In order to link to another page on your web site, you need to know the target page name and:

a
The name of your web server

b
The character encoding of the target page

c
The numeric address of the target location

d
The path to the target page from your current page location

Answers

Answer:

I belive it would be D or C

Explanation:

Thats the only 2 answeres that would logically make since

100 POINTS!!!!
Select 3 examples of netiquette guidelines.

.Follow the same standards online as you would in real life.
Always write in all caps to ensure messages are understood.
Deceive, steal, and defraud online when the opportunity arises.
Respect other people’s data and time limitations.
Share accurate and helpful information over the internet.

Answers

The examples of netiquette guidelines are:

Follow the same standards online as you would in real life.Respect other people’s data and time limitations.Share accurate and helpful information over the internet.

What is netiquette guidelines?

The term netiquette is known to be the short form of Internet etiquette or network etiquette.

Conclusively, They are known to be the different guidelines for accurate and right communication se in the online community. It is made up of the right ways for sending e-mail, making conversations online, and others.

Learn more about  netiquette guidelines from

https://brainly.com/question/3493104

Which of the following is a benefit of using a passphrase?
A. A passphrase is easy for the creator to remember
B. A passphrase can be shorter than a standard password
C. A passphrase will never need to be updated, even if it was compromised in a breach
D. All of the above

Answers

Answer:

Brainliest pls

Explanation:

The benefit of passphrases is that they make it easier for a user to generate entropy and a lack of order—and thus more security—while still creating a memorable credential. Generating entropy through randomized characters can be difficult, but this also makes it more difficult to launch a cyberattack against you.

The following is a benefit of using a paraphrase is D. All of the above.

What is a paraphrase?

Paraphrasing manner placing a person else's thoughts into your personal words. Paraphrasing a supply includes converting the wording even as retaining the authentic meaning. Paraphrasing is an opportunity to quote.

The advantage of paraphrases is they make it simpler for a consumer to generate entropy and a loss of order—and for that reason extra security—even as nevertheless growing a memorable credential. Generating entropy thru randomized characters may be tough, however, this additionally makes it extra tough to release a cyberattack on you.

Read more about the paraphrase :

https://brainly.com/question/17174600

#SPJ2

Select all examples of ethical and appropriate use of business e-mails.

1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.

Answers

Answer:

Number 3 only I believe, sorry if im wrong.

Explanation:

FOR loops are considered to be which of the following:

A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops

Answers

Answer:

C. counter controlled loop

Explanation:

A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).

- It must initialize a counter variable to a starting value.

- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.

- It must update the counter variable during each iteration. This is usually done by incrementing the variable.

Please help me on this it’s due now

Answers

Answer:

I believe the answer is both A and B

explanation : I just read thru both and I chose the one that seemed to make more sense I hope you get it right

Correctly installed tubing is installed in a neat fashion with bends that follow existing _____. Group of answer choices rules contours trends assumptions

Answers

Correctly installed tubing is installed in a neat fashion with bends that follow existing contours.

What is tubing?

Tubing is known to be the original flow conduit that is often employed by people to move created fluids to the surface or in fluids formation.

Note that it is often used in wells and as such, a rightly installed tubing is installed in a good and clean way with bends that follow existing contours.

Learn more about tubing from

https://brainly.com/question/17274244

the oppurtunity cost of earning an advanced college degree is that

Answers

You can use it to win arguments on the internet

Answer:

you like to say hi

Explanation:

new ppl are wihn

In two-dimensional arrays, the _____________ is always listed second.

Answers

Answer:

row

Explanation:

write an QBASIC programme to find the area of circle


Answers

CLS

INPUT “ENTER RADIUS”; R

A = 3.14 * R ^ 2

PRINT “AREA OF CIRCLE IS ”; A

END

A _______ is a group of elements that you want to style in a particular way.

a. id
b. element
C. class

Answers

a id is a group of elements of that you want to style in a particular way

Answer:

Brainliest

Explanation:

C. class

A ________ is any business event that generates data worthy of being captured and stored in the organization’s database.

Answers

the answer is transaction

While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply

Answers

The way a person should  reply the client is that An enterprise network will have more sensitive and confidential information.

What are sensitive and confidential information?

Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.

Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.

See options below

How should you reply?

The devices required for access control can only be afforded an enterprise

An enterprise network will have more sensitive and confidential information

Access controls can only be configured by security admins

Enterprises attract more business when using access control.

Learn more about client from

https://brainly.com/question/25385643

An animated film that you have seen that was particularly effective. which characteristics made it successful?

Answers

If you want to make a successful animation, you could think about the graphics and how smooth the characters look. You could make sure the mouths are in sync with the voices. Make sure the theme of the animation is gripping and think about your audience. An example is Pixar Studios. Their main target audience is children, but their content is still good for all ages. A good idea is to make your content family-friendly, this will make sure you get more watchers.

I hope this could help you...

Can someone answer this question please because i didn't understand.

Name the icon you use on your graphical user interface the least. Explain why you rarel use it.

Answers

Answer:

Read below

Explanation:

Your graphical user interface is essentially your home screen on your phone or computer. You interact with the icons of apps on your phone. This question is worded kind of weird, but I would assume that you would just pick the app you use the least and explain why.

You conduct an experiment to find the probability of a flipped coin landing on
heads or tails. You flip the coin 10 times, with a result of 8 heads and 2 tails,
and conclude that the probability of a coin landing on heads is 80%. Why did
you get inaccurate results?
A. The size of the coin wasn't considered.
B. The sample size was too small.
C. There is only one head and one tail, so the results should be 50%
each.
O D. You didn't flip the coin high enough.

Answers

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

C. The probability of choosing something could either be this or that . Considering this, the probability of obtaining a head should be 50%

Where was the oldest national broadcasting network in the world founded?.

Answers

Answer:

Headquartered at Broadcasting House in London.

Explanation:

A Card class has been defined with the following data fields. Notice that the rank of a Card only includes the values from Ace - 10 (face cards have been removed):

class Card {

private int rank; // values Ace (1) to 10
private int suit; // club - 0, diamond - 1, heart - 2, spade - 3

public Card(int rank, int suit) {
this.rank = rank;
this.suit = suit;
}
}

A deck of cards has been defined with the following array:

Card[] cards = new Card[40];

Which of the following for loops will populate cards so there is a Card object of each suit and rank (e.g: an ace of clubs, and ace of diamonds, an ace of hearts, an ace of spades, a 1 of clubs, etc)?

Note: This question is best answered after completion of the programming practice activity for this section.

a
int index = 0;
for (int suit = 1; suit < = 10; suit++) {
for (int rank = 0; rank < = 3; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

b
int index = 0;
for (int suit = 0; suit < = 4; suit++) {
for (int rank = 0; rank < = 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

c
int index = 0;
for (int rank = 1; rank <= 10; rank++) {
for (int suit = 0; suit <= 3; suit++) {
cards[index] = new Card (rank, suit);
index++;
}

d
int index = 0;
for (int suit = 0; suit < = 3; suit++) {
for (int rank = 1; rank < 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

Answers

Answer: b

Explanation: i did this one!!!!!!!!!!

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

easy python question, no explanation just right answer

Answers

Answer:

See the code below.

Explanation:

def sumOfTwo(a, b, v):

   output = False

   for i in a:

       for j in b:

           sum = i + j

           if sum == v:

               output = True

   print(output)

sumOfTwo([-4, 6, 1], [10, .5, 30], 6)

You can use any online python ide to check the code.

Please help me on this it’s due now

Answers

Answer:

All of the Above

Explanation:

TDL professionals meet all of these options.

The statement that best describes the benefits of a career in transportation, distribution, and logistics (TDL) may include all of the statements.

What is TDL?

TDL stands for transportation, distribution, and logistics. It is characterized as an expanding industry that mutually connects manufacturers and other companies to consumers.

According to the present times, with a huge increase in eCommerce, a strong TDL workforce is required to transport goods from one location to another safely and on time.

The benefits of a career in TDL involve professional work in a highly collaborative environment that values teamwork, professionals meet the needs of consumers across the globe, and there are several opportunities to solve unique problems in the TDL industry.

Therefore, the statement that best describes the benefits of a career in transportation, distribution, and logistics (TDL) may include all of the statements.

To learn more about Transportations, refer to the link:

https://brainly.com/question/27667264

#SPJ7

Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.

Answers

Answer:

Explanation:

It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.

It's not A. Resistance is a floating physical thing present in the air.

B could be correct, but there is a better answer.

The answer is C. A thermistor is a resistance that is temperature sensitive.

When trying to find a machine that is needed to access the data can be difficult. What is this an example of?.

Answers

There are different kinds of computer language. The above is an example of Machine language. It is also a kind of input devices.

Why machine language?

Machine language is known to be a type of language that can only be understood by a computer. It is therefore very difficult for a person to understand as it is the only thing that the computer system can use.

When a person is trying to find a machine that is needed to access the data, it will be be difficult as one is not familiar with the machine language and what can be the best tool to use.

Learn more about Machine language from

https://brainly.com/question/5045657

A distinguishing feature of methods that have the reserved word void in the method header is that they have:.

Answers

Answer:

no return statements

Explanation:

A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.

What is reserved word?

Reserved words are expressions that have been designated for a certain purpose but cannot be used when naming variables. For instance, "print" is a reserved term since it is used to display text on a screen in many different languages.

Operating systems employ reserved words as a way to designate a device file or another service. The MS-DOS and Windows operating systems' reserved terms are listed below.

For instance, if you try to save a file as CON or CON.txt, you can get an error saying the file already exists or that the name is reserved.

Therefore, A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.

To learn more about no return statement, refer to the link:

https://brainly.com/question/14894498

#SPJ2

A method that executes because it is called automatically when an appropriate event occurs is an event ____. A) Responder B) Listener C) handler D) source

Answers

In programming a typical type of method that executes when an event is trigered is called event handler

C) handler Event Handler

Event Handlers

What are handlers?

Handler are codes that runs on the background thread in a multithreaded programme, the executes series of operation when an events trigers their operations.

Learn more about handlers here:https://brainly.com/question/20028260

Other Questions
During practice, a soccer player kicks a ball and sends it rolling across the grass. Over a short distance, the ball slows down and stops.Which two statements support the idea that energy is conserved in this example? how do you find the perimeter on a pythagorean theorem word problem? Arrange the parts of the lymphatic system in the order they are present in the body, from top to bottom. axillary lymph nodes spleen popliteal lymph nodes cervical lymph nodes thymus Given the complex number z_1=3\big(\cos \frac{14\pi}{15} +i\sin \frac{14\pi}{15}\big)z 1 =3(cos 15 14 +isin 15 14 ) and z_2=3\sqrt{3}\big(\cos \frac{11\pi}{15} +i\sin \frac{11\pi}{15}\big)z 2 =3 3 (cos 15 11 +isin 15 11 ), express the result of z_1z_2z 1 z 2 in rectangular form with fully simplified fractions and radicals. What are the two steps a producer can take to gain an absolute advantage? produce more goods. use high-quality resources. produce more expensive goods. use fewer resources. produce high-quality goods. use local resources. Primary deviance is nonconformity that is detected by those in authority. please select the best answer from the choices provided t f Why are chromosomes arranged into pairs. Give it in it's short answer. Solve the math problem I NEED THIS RIGHT NOW HELP NEED WORKSHEET COMPLETED BY 10:45 AM!!!!!! WILL GIVE 100 POINTS AND BRAINLIEST IF FULL SHEET IS COMPLETED!!!!!!!!!!!!!! BY THE EXACT TIME!!!!!!!!!! A recent survey found that 5% of the population of the United States is unemployed. If Charlotte, North Carolina, has 30,850 unemployed, what is the population of Charlotte? The population of Charlotte, North Carolina is approximately_____? PLEASE HELP!!!Write an expression using fractions to show how to determine the amount that each person will pay?Then calculate each person's contributions showing all steps in long division.my chart:jazzy: 35.7$emily:48.9$sarah:48.9$layla:19.3$total amount: 327$ Mr.simpson is constructing a swing set for his children. He measures that the patform will be 7 feet high and would like to attach an 11-feet slide. How many feet away from the base will it be set? (Round to the nearest tenth.) Question 3(Multiple Choice Worth 5 points)(03.01 LC) Which of the following is NOT an example of an effective "I" message? Plot the image of triangle AABC under a reflection across the y-axis. Please help me i will give brainliest Why is innate immunity referred to as nonspecific?because it provides a built-in mechanism of defense that does not require "training"because it is a form of defense found in all animal speciesbecause it is a form of defense that functions in all human body systemsbecause it provides defense against a wide range of pathogens Unscramble the letters to reveal the Spanish words for different types of fabrics or adjectives used to describe clothing 1) damatesap 2) sleunar 3) ldgoan 4) naohc 5) omcdoni Explain the use of each part of Vernier callipers? What is the y-intercept of the graph of p(x)=-3(x-2)+4