________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies
A) Affective computing B) Crowdsourcing
C) Crisis-mapping D) Social networking
C
Computer Science & Information Technology
You might also like to view...
You can store a macro in ________, the default setting for the workbook macro
Fill in the blank(s) with correct word
Computer Science & Information Technology
On the Layers panel, a layer group displays with a folder icon and with a ____ that reveals the individual layers in the group, or indicates that they are hidden.
a. square b. green bullet c. triangle d. red watch icon
Computer Science & Information Technology
Which of the following is not an executable used with USMT?
a. ScanState.exe b. LoadState.exe c. UsmtUtils.exe d. None of the above
Computer Science & Information Technology
Choose the correct pronoun in the following sentence.The committee issued _________ final findings in a brief report.?
A. ?its B. ?their
Computer Science & Information Technology