1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
3 years ago
9

Lai worked on a global team for an American company, and all her work had to be completed in her second language, English. Somet

imes her teammates misinterpreted her meaning. Lai has unintentionally created of a(n) ______ barrier to communication.
A) Decoding
B) Sender
C) Feedback
D) Receiver
E) Encoding
Computers and Technology
2 answers:
STALIN [3.7K]3 years ago
5 0

Answer:

E) Encoding

Explanation:

    In a telephone conversation, a simple online conversation or a video conference conversation, for example, the communication situation is based on the exchange of messages from one point to another, provided that the message is linguistically encoded. This condition is no different in a simpler communicational situation: in any case, message coding refers to the organization of the terms that compose it in a logical system of recognizable (decodable) signs by a group of speakers. Message coding in linguistic communication is a conventional process that is pre-established among speakers of a language.

N76 [4]3 years ago
4 0

Answer:

E) Encoding.

Explanation:

Communication is important aspect of life.Communication barriers occurs at all stages of communication from when the sender sends the message to the receiver receiving the message. Lack of communication skill in that particular comes in encoding barrier.So we conclude that the answer is Encoding.

You might be interested in
What are the data types in access​
Julli [10]

Answer:

Data type in Microsoft Access Database

Text  

Memo  

Byte  

Integer

Long  

Single  

Double  

Currency  

AutoNumber  

Date/Time  

Yes/No  

Ole Object  

Hyperlink  

Lookup Wizard

Explanation:

4 0
3 years ago
Application area of word processor?​
kompoz [17]

Answer:

  1. Typing, editing,and printing different types of document .
  2. Formatting text, paragraph , pages for making attractive document .
  3. Checking spelling and grammar of document for making it error free.
  4. Inserting and editing pictures , objects, etc.
  5. Adding watermark , charts , quick flip, etc.
7 0
3 years ago
Read 2 more answers
Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical
lisov135 [29]

Answer:

Hybrid.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model: it can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

II. An incremental model: it refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

III. A spiral model: it can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

Basically, softwares are categorized into three (3) main categories based on the development platform and these are;

a. Web application.

b. Native application.

c. Hybrid application.

A hybrid application is a type of software application that is designed based on the combination of the elements of both web applications and native applications.

Typically, a hybrid application is a web application that is developed in a native application shell, using a standardized web programming language such as CSS, JavaScript, and HTML.

Generally, a hybrid application avails a programmer the opportunity to write a code for a mobile application once while accommodating or being compatible with multiple app platforms such as Android, Windows, iOS, etc.

Hence, a hybrid application is the best choice of an application when it's critical for the end users to be able to use the features associated with a device such as a mobile phone but performance isn't critical.

4 0
3 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
1 year ago
Archie wants to optimize an XFS filesystem and minimize the chance of future corruption. Which of the following commands will co
svlad2 [7]

Answer:

The best answer is "B"

xfs_fsr

Explanation:

The is a typical format of the command to use:

xfs_metadump -o /dev/sdb1 /reviewxfs

6 0
3 years ago
Read 2 more answers
Other questions:
  • How to stop getting emails from colleges?
    9·1 answer
  • Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
    9·1 answer
  • You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen
    11·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
    12·1 answer
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the
    7·1 answer
  • Point out the correct statement.
    11·1 answer
  • Please help!!!! will mark brainliest!!
    7·2 answers
  • You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on.
    8·1 answer
  • First Computers and Technology question in 4 years..
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!