What are the two distinct stages of message transmission in the two step flow theory? -Technology

1 Answer

Answer :

The Two Step Flow theory proposed by Paul Lazarsfeld, states that messages from the media get transmitted in two distinct stages:1. Through Opinion Leaders who pay close attention to the mass media and its messages.2. These opinion leaders then pass their own interpretations in addition to the actual media content.

Related questions

Description : How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ? (A) 16 (B) 17 (C) 18 (D) 19

Last Answer : (D) 19

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : Theory of multiple intelligence implies the following except Options: A) intelligence is a distinct set of processing operations used by an individual to solve problems. B) disciplines should be presented ... could be accessed through a variety of means D) emotional intelligence is not related to IQ

Last Answer : D) emotional intelligence is not related to IQ

Description : What are the stages in a four step delivery bowling?

Last Answer : Need answer

Description : Discuss the structure of an E_mail message. -Technology

Last Answer : In an E-mail message, you will see the following fields which are as follows: To Mail-id of a recipient. Cc (Carbon copy) It allows you to send the same mail message to multiple recipients at ... Send button Once you complete the E-mail message, click at Send button to send the E-mail message.

Description : Create XML markup to represent a message sent on 7 June, 2014 to Amit and Saurabh by Mohit. -Technology

Last Answer : Mohit Amit Saurabh Submitted Successfully

Description : A digital code attached to an electronic message to provide it unique identity is called ………… -Technology

Last Answer : A digital code attached to an electronic message to provide it unique identity is calleddigital signature.

Description : A mail or message sent to a large number of people indiscriminately without their consent is called ..... -Technology

Last Answer : A mail or message sent to a large number of people indiscriminately without their consent is calledspam.

Description : Emile Durkheim has given us a theory of three stages of human thought.

Last Answer : Correct the underlined word and complete the sentence : Emile Durkheim has given us a theory of three stages of human thought.

Description : -The theory of stages of growth is associated with (a) Simon Kuznets (b) W.W. Rostow (c) Paul Samuelson (d) Colin Clark

Last Answer : (b) W.W. Rostow

Description : Which of the following stages is not included in AIDAS theory? A. Gaining interest B. Evaluation C. Securing attention D. Inducing action E. Building satisfaction.

Last Answer : B. Evaluation

Description : Sourya committee had proposed the establishment of sourya institutes of Technology (SITs) in line with Indian Institutes of Technology (IITs) to cater to the technological and industrial needs of a developing country Which of the ... (iv) only (C) (ii) and (iv) only (D) (ii) and (iii) only

Last Answer : Correct option is (C). Option (i) and (iii) state phrases like ‘in the initial years’ and ‘SIT like institutions can only be established in consultation with IIT’ cannot be logically inferred so (ii) and (iv) are the best inferences i.e. option (C) 

Description : Explain two problems that can occur during transmission of data. -Technology

Last Answer : TWO problems that can occur during transmission of data are as follows:1. Crosstalk Disturbance caused by the electric or magnetic fields of one signal in an adjacent signal.2. Attenuation During transmission, the signal strength is reduced this phenomenon is called attenuation.

Description : Compare and contrast the two wireless transmission media; bluetooth and infrared. -Technology

Last Answer : Bluetooth and Infrared both are short range wireless transmission media. This is the only point at which both these data transmission technologies look similar but there is a lot of difference ... other hand bluetooth uses a radio frequency which allows transmission through walls and other objects.

Description : Which of the following uses cables to connect two or more computers? (a) Transmission (b) Unguided -Technology

Last Answer : (c) In guided media, signals are guided through cables.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : Which guided media provide secure transmission amongst all of them? -Technology

Last Answer : Optical fibre provides secure transmission as compared to twisted pair and co-axial cable. As, it is more immune to tapping than copper cables.

Description : Which of the following is not a transmission medium? (a) Telephone lines (b) Co_axial cable (c) Modem (d) Microwave system -Technology

Last Answer : (c) All are communication channel but modem is a dev that convert analog signals to digital signals or vice-versa

Description : Reduction of signal strength during transmission is called attenuation. -Technology

Last Answer : TrueDuring transmission, the signal strength is reduced, this phenomenon is called attenuation.

Description : Microwave transmission is an example of line_of_sight transmission. -Technology

Last Answer : TrueMicrowave are the radiowave which supports line-of-sight transmission.

Description : Which is a hypothetical string theory weightless particle? -Technology

Last Answer : In theories of quantum gravity, the graviton is the hypothetical quantum of gravity, an elementary particle that mediates the force of gravity. ... In string theory, believed to be a consistent theory of quantum gravity, the graviton is a massless state of a fundamental string.

Description : Pick out the wrong statement. (A) 'Hold back' is defined as the fraction of material that stays longer than the mean residence time (B) Study of non-ideal flow reactor is done experimentally ... final stages of reaction (D) A batch reactor cannot be used to study the kinetics of catalytic reaction

Last Answer : (D) A batch reactor cannot be used to study the kinetics of catalytic reaction

Description : Who is the determined by the time taken by the stages the requires the most processing time: a. Clock period b. Flow through c. Throughput d. None of these

Last Answer : a. Clock period

Description : The time taken for all stages of the assembly line to become active is called the: a. Flow through time b. Clock period c. Throughput d. All of these

Last Answer : a. Flow through time

Description : In __________ transmission, a unique SYNC character is transmitted at the beginning of each message. A. asynchronous B. synchronous C. digital D. analogue

Last Answer : B. synchronous

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : When making a blind transmission you should: a. Transmit the message twice b. Transmit each word twice c. Repeat the message on 121.5 MHz d. Wait for visual signals

Last Answer : a. Transmit the message twice

Description : The definition of the phrase “STANDBY” is: a. Consider the transmission as not sent b. Proceed with your message c. Wait and I will call you d. Hold your present position

Last Answer : c. Wait and I will call you

Description : The term “CORRECTION” is used when: a. The readback of a message is incorrect b. The readback of a message is correct c. The message has to be deleted d. An error has been made in the transmission and the correct version isH..

Last Answer : d. An error has been made in the transmission and the correct version isH..

Description : The characters making up the message in a synchronous transmission are collectively referred to as the data

Last Answer : block

Description : When making a blind transmission you should: a. Transmit the message twice b. Transmit each word twice c. Repeat the message on 121.5 MHz d. Wait for visual signals

Last Answer : a. Transmit the message twice

Description : The definition of the phrase “STANDBY” is: a. Consider the transmission as not sent b. Proceed with your message c. Wait and I will call you d. Hold your present position

Last Answer : c. Wait and I will call you

Description : The term “CORRECTION” is used when: a. The readback of a message is incorrect b. The readback of a message is correct c. The message has to be deleted d. An error has been made in the transmission and the correct version isH..

Last Answer : d. An error has been made in the transmission and the correct version isH..

Description : The vehicle through which the coded message is transmitted from the source to the receiver is called a(n) A)coder. B)decoder. C)encoder. D)relay channel. E)medium of transmission.

Last Answer : E)medium of transmission.

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : …….. and ……… tags break the line flow. -Technology

Last Answer : and tags break the line flow.

Description : What were Raymond Williams’s views on Flow and Continuous interruption? -Technology

Last Answer : Raymond Williams was an influential critic. In his book Television: Technology and Cultural form he proposed the term flow to describe the distinctive nature of television. In his trip to USA ... thiscontinuous interruption becomes a part of the overall narrative and the audiences get used to it.

Description : In transmission line, which of the following is the first step in the procedure of using stub matching? A. Calculate stub susceptance. B. Calculate load admittance C. Connect stub to load D. Transform conductance to resistance

Last Answer : B. Calculate load admittance

Description : Which of the following devices will receive voltage surge first travelling on the transmission line ? (a) Lightning arresters (b) Relays (c) Step-down transformer (d) Switchgear

Last Answer : (a) Lightning arresters

Description : Compare the power sources of synchros and step transmission systems.

Last Answer : Synchros use ac; step transmission uses dc.

Description : A generator is connected through a 20 MVA, 13.8/138 kV step down transformer, to a transmission line. At the receiving end of the line a load is supplied through a step down transformer of 10 MVA, 138/69 kV rating. A 0.72 ... load (in per unit) in generator will be (A) 36 (B) 1.44 (C) 0.72 (D) 0.18

Last Answer : A generator is connected through a 20 MVA, 13.8/138 kV step down transformer, to a transmission line. At the receiving end of the line a load is supplied through a step down transformer of 10 MVA, 138/ ... MVA and 69 kV in load circuit, the value of the load (in per unit) in generator will be 36 

Description : Three phase step-up transformer installed at power house, just before commencement of transmission line, have:

Last Answer : Three phase step-up transformer installed at power house, just before commencement of transmission line, have: star delta connections

Description : How can I send email to a cell phone as a text message if I don't know the phone's carrier?

Last Answer : answer:The go-to service for this used to be Teleflip, but they’ve gone belly up. You can try to find a similar resource on this website: http://www.freetextsms.net/