Answer
You can whisper,write notes, text, e-mail, body language, and even use a sign language.
Explanation
By adjusting your communication in these ways one can decrease noise. Whispering is where you speak softly to someone where the information will be only heard by the person you are addressing and this will not make any noise. Also use of a text or an email where the message will be delivered electronically but not verbally. Then there is the body language which is a nonverbal but a physical behavior used to express a certain information or also one can use sign language.
What what what what what what
Answer:
When you use a WYSIWYG editor you typically specify the content and layout while the editor generates the HTML code
Explanation:
Required
Complete the blanks
In WYSIWYG, the user of the application provides contents to the WYSIWYG software and also designs the appearance; The appearance is referred to as the layout.
Throughout the design, the user will not use HTML codes; it is the duty of the WYSIWYG editor to generate HTML code based on the input designs by the user.
Answer:
Check below for answers and explanations.
Explanation:
The major reasons why computer processes are suspended or terminated are:
1. When there is insufficient memory for successful completion of the process
2. When there's an unauthorized access of any of the computer resources by the process.
It is possible that some processes are terminated why some are suspended because, when the system runs out of memory, the running processes are put on hold until the system is able to create free memory space for the completion of the process. In this case the process is suspended. But if the system cannot provide enough space for the process, the process is terminated.
In the example provided in this exercise, some of the processes were suspended because the system wants to create free memory space for their completion while others are terminated either because the available space is not sufficient for their completion or they want to access an unauthorized resources on the system.