GIVE THE FOLLOWING:

1. Research three iconic or famous personalities in the field of business who have been featured in print, broadcast, and new media.

2. Compare and contrast how they are presented in each media type.

3. Point out various ways on how the different types of media helped them empower themselves in the field they have chosen.​

Answers

Answer 1

Answer:

i know i know hehe

Explanation:

yes it is

yes

Answer 2

1. Three iconic personalities in the field of business who have been featured across print, broadcast, and new media are:

a. Elon Musk - Co-founder and CEO of Tesla and SpaceX.

b. Oprah Winfrey - Media mogul and talk show host.

c. Warren Buffett - Billionaire investor and CEO of Berkshire Hathaway.

2. In print media, these personalities are often presented through in-depth interviews, profiles, and feature articles that delve into their personal and professional lives.

In broadcast media, they appear on TV shows, interviews, and documentaries, allowing the audience to see and hear them directly.

New media, including social media platforms, showcases their insights, achievements, and behind-the-scenes moments, engaging with a global audience in real-time.

3. Different types of media have empowered these individuals by providing them with platforms to reach and influence a vast audience.

Print media offers credibility through well-researched pieces, broadcast media allows for mass exposure and connection with viewers, while new media enables direct communication, promoting their ideas, projects, and businesses worldwide.

This exposure has helped enhance their reputations, attract investors, and create a loyal following, thus strengthening their influence and success in the business world.

Know more about iconic personalities:

https://brainly.com/question/33415078

#SPJ7


Related Questions

State two functions of a computer case?​

Answers

Answer:

Provides a standardized format for the installation of non-vendor-specific hardware.

Protects that hardware and helps to keep it cool.

Explanation:

The computer case serves two primary functions:

Protecting the internal components from damage, dust, and other environmental factors.Providing a framework to hold and organize the internal components and connect them to external devices and power sources.

What is a computer case?

A computer case, also known as a computer chassis or tower, is a housing that encloses and protects the internal components of a computer, including the motherboard, central processing unit (CPU), power supply, hard drives, and other peripherals.

The case is typically made of metal or plastic and is designed to provide a framework that holds the components securely in place and protects them from physical damage, dust, and other environmental factors.

Computer cases come in a variety of shapes and sizes, including full-tower, mid-tower, and mini-tower designs, and often include features such as cooling fans, front-panel ports, and tool-less installation mechanisms to make it easier to assemble and maintain the components inside.

Learn more about computer here:

brainly.com/question/15707178

#SPJ2

list at least 5 disadvantages caused by computer viruses?​

Answers

The 5 disadvantages caused by computer viruses:

A lot of pop-ups.Slow performance.Consistent crashes.Storage space shortage.The issues of Missing files.
what are Computer virus?

A computer virus is known to be a kind a type of computer program that is, if it is executed, tends to double itself by changing other computer programs as well as inserting its own  kind of code.

Note that if the  replication process is said to succeeds, the affected areas are then known to be called "infected" with a computer virus.

Other disadvantages of computer virus are:

Unknown login items.Increased network traffic.Browser homepage is altered.

Therefore, The 5 disadvantages caused by computer viruses:

A lot of pop-ups.Slow performance.Consistent crashes.Storage space shortage.The issues of Missing files.

Learn more about computer viruses from

https://brainly.com/question/8401461

#SPJ1

Which of these is an example of an input device?
(1 point)
O a mouse
O a screen
O a printer
O a 3-D printer

Answers

A mouse is an input device.

Which of the following are types of containers that can be used in Windows Server 2016?

Answers

Answer:

Windows Server Container and Hyper-V Container. They differ mainly in the degree of isolation they provide. Windows Server Container uses process and namespace isolation technology to isolate applications.

Explanation:

window server 2016 support two types of container nearly

Topology in networking essentially just means how the computers are interconnected with one another.

Answers

Answer:

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field buses and computer networks.

There are five types of topology in computer networks:

Mesh Topology.

Mesh topology is a type of networking where all nodes cooperate to distribute data among each other. This topology was originally developed 30+ years ago for military applications, but today, they are typically used for things like home automation, smart HVAC control, and smart buildings.

Star Topology.

A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.

Bus Topology.

A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.

Ring Topology.

A ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.

Hybrid Topology.

A hybrid topology uses a combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.

.

.

.

Please mark as brainliest.

Answer: In network layout, in terms of drafting RFP's, how computers are interconnected with each other physically, is a physical topology. In terms of how everything is connected to each other with the cables, on paper, that is a logical topology.

Explanation: Physical Topology is related to how the network actually appears as if you were in the room, looking at it. While logical topology, is usually a schematic on paper, showing how all of the devices are connected, which ports are they connected to, what are the Ip's, Mac addys, and such.

20. Electricians will sometimes call
"disconnects" or a "disconnecting means."
A) O Three-pronged plugs
B) O Switches
c)O Electrical cords
D) C Two-pronged plugs

Answers

Electricians will sometimes call "disconnects" or a "disconnecting meaning option B)  Switches.

What exactly do electricians do?

An Electricians are  known to be people who are responsible for the work of repairing, installing as well as  maintaining control systems, lighting, communications, and others.

Note that Electricians will sometimes call the term "disconnects" to a person to off the  Switches.

Hence, Electricians will sometimes call "disconnects" or a "disconnecting meaning option B)  Switches.

Learn more about Electricians  from

https://brainly.com/question/24786034

#SPJ1

Computing Systems Unit Test
Computing Systems Unit Test
Define the three overarching domains that contain application software system software and hardware layers along with the
of abstraction in each and explain in detail how each of these layers, whether software or hardware, interacts with the
hers Explain your answer in 3-5 sentences

Answers

Explanation:

how ubuntu being practiced in your community?

What are phone lines that are leased to customers at a fraction of their data-carrying capacity
but at a lower price?
cable
fiber-optic cable
T-line
packet switch

Answers

Answer:

hdkkkkkaixnr w9fjr fje9rjjb

emekroo

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?

Answers

The things that you should  do next in the troubleshooting process are:

Set up a plan of action to handle or resolve the problem and then you need to implement the solution.Lastly you have to verify full system functionality and, if applicable, do implement any kind of preventive measures.

What is the troubleshooting theory?

In regards to the issue above, one need to set up a theory of probable cause and then they need to Test the theory to know the cause and when one has find the main cause of the problem, one need to follow the sets above.

The term troubleshooting in a computer is known to be a term that connote a systematic method of  problem-solving that is said to be used a lot to be able to ascertain and correct issues with complex machines, electronics, computers as well as software systems.

Therefore, The things that you should  do next in the troubleshooting process are:

Set up a plan of action to handle or resolve the problem and then you need to implement the solution.Lastly you have to verify full system functionality and, if applicable, do implement any kind of preventive measures.

Learn more about troubleshooting  from

https://brainly.com/question/14394407
#SPJ1

A designer creates a mockup of a website homepage for a youth services nonprofit. They incorporate elements that add hierarchy to the design, make text easy to read, and add visual style. What visual design element are they using?

Typography

Iconography

Layouts

Symbology

Answers

Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

What in web design is a mockup?

An application or web page mockup is seen as a kind of a  static design that includes a lot  of the final design elements but is said to be not functional.

Note that A mockup often contains some placeholder data and is less polished than a live page. It is found to be helpful to break down each element of the definition.

Through the use of  website mockup can help you realize your vision and decide on design concepts before developers begin to work. A sketch is the first step in the web design process before moving on to a wireframe.

Therefore, Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

Learn more about visual design element from

https://brainly.com/question/19584310
#SPJ1

Explain insert a ternary operator.?​

Answers

Explain insert ternary operator.?

______________________________________

QUESTION;

Explain insert ternary operator.?

ANSWER;

The ternary operator is an operator that exists in some programming languages,which takes three operands rather than typical one or two that most operators use. lt provides a way to shorten a simple of else block. for example,consider the below JavaScript code. var num =4, msg = "";if (num === 4 )

____________________________________

Which virus is also known as hybrid virus ?​

Answers

Answer:

A multipartite virus

Explanation:

what's drawing toolbar​

Answers

Answer:

The drawing toolbar, a feature in Microsoft Word, is a collection of many tools to draw and colour shapes, add text effects, create text boxes, and add graphics with colours within a Word document. In addition, users could choose from pre-drawn shapes, add clip art or draw shapes as desired.

Carla wants to learn more about how CPUs work. Which of these videos would be the MOST useful to her?
(1 point)
O "How Input Devices Work™
O "Storage Devices for Beginners"
O "Computer Output Devices 101"
O "Introduction to Computer Processing"

Answers

Answer:

it works with atoms

batteries

keyboard

Which of the following is true about primitive data types?

A. They can only represent numeric data.
B. Primitives have built in methods.
C. They can hold words and numbers at the same time.
D. They hold only one piece of data at a time.
E. There are a total of 2 primitive types.

Answers

Answer:

They hold only one piece of data at a time.

Explanation: I got it right

What
are the
Contituent of a c p u

Answers

It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor. The ALU performs arithmetic operations, logic operations, and related operations, according to the program instructions.

You can use the Cut and Paste commands to move files from one location to another.
er:
a O True
b O False

Answers

Answer:

true

Explanation:

What materials are used to make a steel headgear

Answers

Answer:

headgear or concrete structure A concise definition of a Headgear, is a steel or concrete structure constructed to facilitate the transfer of men, material and rock from underground as well as the housing of equipment and safety devices used for sinking and productionw

material used to make steel To make pure steel, iron and carbon are needed. On its own, iron is not very strong, but a low concentration of carbon - less than 1 percent, depending on the kind of steel, gives the steel its important properties. The carbon in steel is obtained from coal and the iron from iron ore.

Explanation:

i hope it helped it is from my science book

(problem is given by the image)

Answers

The program that prompts the user for three integers and displays their average as a floating point is given below:

The Code:

import java.util.Scanner;

public class ArithmeticSmallestLargest {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       int num1;

       int num2;

       int num3;

       int sum;

       int average;

       int product;

       int largest;

       int smallest;

       System.out.print("Enter First Integer: ");

       num1 = input.nextInt();

       System.out.print("Enter Second Integer: ");

       num2 = input.nextInt();

       System.out.print("Enter Third Integer: ");

       num3 = input.nextInt();

       sum = num1 + num2 + num3;

       average = sum / 3;

       product = num1 * num2 * num3;

       largest = num1;

       smallest = num1;

       if(num2 > largest)

           largest = num2;

       if(num3 > largest)

           largest = num3;

       if(num2 < smallest)

           smallest = num2;

       if (num3 < smallest)

           smallest = num3;

       System.out.println("The sum is " + sum);

       System.out.println("The average is " + average);

       System.out.println("The product is " + product);

       System.out.println("Largest of three integers is " + largest + " and the smallest is "+ smallest + ".");

   }

}

Read more about java programming here:

https://brainly.com/question/18554491

#SPJ1

List two (2) important factors which should be considered when merging documents

Answers

Answer:

Cash vs. ...

Impact on Pro-forma EPS and Ownership. ...

Impact on Credit Statistics. ...

Purchase Price Allocation. ...

New Depreciation and Amortization from Write-Ups. ...

Creation of Goodwill. ...

Asset Sale. ...

Stock Sale.

Explanation:

These are just a couple of examples, hope this maybe helped :)

Which computer-related job duties belong to the discipline of information
technology?
O A Planning, creating, testing, and maintaining applications used by
devices
OB. Planning, creating, testing, and maintaining physical computer
systems
OC. Analyzing organizational operations to find opportunities for
improvement
OD. Analyzing computer systems to protect computer networks from
cyber threats
SUBMIT

Answers

Answer:

The answer is D, Analyzing computer systems to protect computer networks from cyber threats.

Explanation:

I computer use binary, octal, and decimal number system true or false

Answers

Answer: No/False

Explanation: Computers are designed to work in binary, which converts hexadecimel numbers into binary, which is 0's and 1's, to then run the functions of a computer. Octal is a programming language used by early IBM. And the decimal number system doesnt really apply seeing as binary already does those equations easily.

write a complete program that declares an integer variable, reads a value from the keyboard in that variable, and write to standard output a single line containing the square of the variable's value.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that complete program that declares an integer variable, reads a value from the keyboard in that variable.

Writting the code:

#include<iostream>

using namespace std;

int main()

{

//declare an integer variable

int n;

//read a value from the keyboard

//cout << "Enter an integer: ";

cin >> n;

//display the square of the variables value

//cout << "The square of the number entered is: ";

cout << n * n;

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

Knowledge Check
Question 1 of 5

What is an unexpected life event?

Answers

Events that take individuals by surprise as they do not know that they are going to happen, they are unplanned.

What do packets and networks mean?

Answers

Answer:

A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks. A packet is the unit of data routed between an origin and a destination on the internet or other packet-switched network — or networks that ship data around in small packets.

Explanation:

Please consider me for brainliest, because I'm trying to move up in rank!

Answer:

network is inernet

Explanation:

Explain how would you label each part of the computer?​

Answers

Answer:

Explanation:

you can simply label computer each part by showing the marking on them using numbers and writing below like 1. for CPU

In order to paint a wall that has a number of windows, we want to know its area. Each window has a size of 2 ft by 3 ft. Write a program that reads the width and height of the wall and the number of windows, using the following prompts.

Wall width:
Wall height:
Number of windows:

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a program that reads the width and height of the wall and the number of windows, using the following prompts

Writting the code:

import java.util.Scanner;

public class WallArea {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       final int areaOfWindows = 6;

       System.out.print("Wall width: ");

       double width = sc.nextDouble();

       System.out.print("Wall height: ");

       double height = sc.nextDouble();

       System.out.print("Number of windows: ");

       double numberOfWindows = sc.nextDouble();

       double area = (width * height) - (numberOfWindows * areaOfWindows);

       System.out.println("Area: " + area);

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

why is hard disk called random access medium​

Answers

RAM is called “random access” because any storage location on the computer can be accessed directly (as opposed to randomly). Hard drives, for instance, are organized in a way that allows the user to store and access information easily by referencing specific locations on the hard drive's platters.

Information overload can put tension on your brain and cause you to feel
A. tired and forgetful.
B. busy and rushed.
C. depressed.
D. addicted.

Answers

A brain under stress from too much information might make you feel rushed and busy. Hence, option B is correct.

What is brain?

Every physical function, including intellect, memory, emotion, touch, motor skills, vision, breathing, temperature, and hunger, is controlled by the sophisticated organ known as the brain. The spinal cord that protrudes from the brain is part of the central nervous system, or CNS.

In a typical adult, the brain weighs roughly 3 pounds and contains about 60% fat. The remaining 40% are made up of various water, protein, carbohydrate, and salt combinations. The brain does not function like a muscle on its own. It is composed of glial cells, neurons, blood vessels, and nerves.

To get more information about brain :

https://brainly.com/question/11950231

#SPJ1

Tormund wants to build a proxy firewall for his two computers, A and B. How can he build it?
A. by connecting computer A with computer B and computer B to the proxy firewall
B. by connecting a different firewall to each computer
C. by connecting computer A to computer B through the proxy firewall
D. by connecting only one of the computers to the firewall

Answers

Answer:

The most effective way for Tormund to build a proxy firewall would be to connect computer A to computer B through the proxy firewall. This would ensure that all traffic between the two computers would go through the firewall, and that the firewall would be able to filter and block any unwanted traffic. Additionally, this setup would allow Tormund to easily monitor and manage all traffic going between the two computers.

Explanation:

Hope this helps!

Other Questions
in brick houses build in the 1960's, was there a space between the first floor and the basement ceiling in pennsylvania? Exercise 1 Underline the correct pronoun. Families sent a load of firewood when (they, their) sent (them, their) children to school. Those with an internal locus of control believe that events turn out as they do based on? Eukaryal proteins that are secreted outside of the cell undergo modification before secretion. which organelles are involved in this secretion pathway? Select all the body and cellular processes that require cell division (mitosis or meiosis) to function. Humanists during the ItalianRenaissance began to read old texts.Which of the following bestdescribes what they began to seevalue within?A. Humanists during the Italian Renaissance beganto see value in family.B. Humanists during the Italian Renaissance beganto see value in personal gain and finances.C. Humanists during the Italian Renaissance beganto see value in things done on earth. The common difference of an arithmetic series is 5 and its tenth term is 98,find its first term how might it be said that a theme of the first passage intersects with a theme of the second passage, with regard to the mississippi river? True or false - The vector for a negative acceleration points in the opposite direction whencompared to the vector for a positive acceleration. What are the importance of taverns to the upcoming colonial movement The nurse is caring for a client who is taking a sustained-release (sr) oral nitrate. how should the nurse instruct this client to take the medication? What is the name of all the cell contents between the nucleus and the cell membrane. Which stage of the writing process involves writing a useable draft of your outline? If demand increases and supply decreases, the change in the equilibrium price will be ______, and the change in the equilibrium quantity will be ______. Please help! Need answers fast Exercise 1 Underline the word that is spelled correctly.I am already (regreting, regretting) my decision. This is a poster used during World War I.The message of this poster portrays what aspect of life on the home front?A government-mandated food conservation programsB the use of propaganda to get people to comply with voluntary rationing effortsC the unwillingness of citizens to make personal sacrifices for the war effortD a push to teach children healthier eating habits The textbook says that fathers' paychecks sometimes increased from being a parent. this benefit in wages and perceived competence is called the:_____. 5. Please help and snow work If i wanted to see whether students were more likely to spill ketchup on themselves in the cafeteria when sitting with their best friends, i would most likely conduct?