________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies

A) Affective computing B) Crowdsourcing
C) Crisis-mapping D) Social networking


C

Computer Science & Information Technology

You might also like to view...

You can store a macro in ________, the default setting for the workbook macro

Fill in the blank(s) with correct word

Computer Science & Information Technology

On the Layers panel, a layer group displays with a folder icon and with a ____ that reveals the individual layers in the group, or indicates that they are hidden.

a. square b. green bullet c. triangle d. red watch icon

Computer Science & Information Technology

Which of the following is not an executable used with USMT?

a. ScanState.exe b. LoadState.exe c. UsmtUtils.exe d. None of the above

Computer Science & Information Technology

Choose the correct pronoun in the following sentence.The committee issued _________ final findings in a brief report.?

A. ?its B. ?their

Computer Science & Information Technology