1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
4 years ago
9

Lai worked on a global team for an American company, and all her work had to be completed in her second language, English. Somet

imes her teammates misinterpreted her meaning. Lai has unintentionally created of a(n) ______ barrier to communication.
A) Decoding
B) Sender
C) Feedback
D) Receiver
E) Encoding
Computers and Technology
2 answers:
STALIN [3.7K]4 years ago
5 0

Answer:

E) Encoding

Explanation:

    In a telephone conversation, a simple online conversation or a video conference conversation, for example, the communication situation is based on the exchange of messages from one point to another, provided that the message is linguistically encoded. This condition is no different in a simpler communicational situation: in any case, message coding refers to the organization of the terms that compose it in a logical system of recognizable (decodable) signs by a group of speakers. Message coding in linguistic communication is a conventional process that is pre-established among speakers of a language.

N76 [4]4 years ago
4 0

Answer:

E) Encoding.

Explanation:

Communication is important aspect of life.Communication barriers occurs at all stages of communication from when the sender sends the message to the receiver receiving the message. Lack of communication skill in that particular comes in encoding barrier.So we conclude that the answer is Encoding.

You might be interested in
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Look out for users with this photo.
Alla [95]

Answer:

why whats wrong with it

Explanation:

4 0
3 years ago
Read 2 more answers
WILL MARK BRAIN LIST!
Maslowich
I think it’s a

if it isn’t a then it’s d
6 0
3 years ago
Read 2 more answers
After a file downloads, you can do any of the following except
loris [4]
Change owner rights... I think you forgot to put the choices, I am taking a wild guess of what the answers could have been.
8 0
3 years ago
An online news website relies on in-page advertisements to make money. Their article pages have multiple slots for advertisement
Masja [62]

Answer:

Create a dynamic-sized circularly-linked list to hold a tuple of the adverts and the count. As the program runs, the sum of the counts is used to calculate the fixed advertisement time which is saved in a variable time_slot. Then a loop statement should be used to traversal the linked list continuously until the count sum is exhausted for the day.

Explanation:

A circularly-linked list is a linked list with both ends joined together. With this data structure, the continuous traversal of the list is easier and faster. A conditional statement is used in the algorithm to check and decrement the count of each advert and when all is zero or false, the program ends.

7 0
3 years ago
Other questions:
  • Your mission is to read this uber-classified memo from the Grand Poobah of annan. Of course, it's in code, so you'll need to wri
    15·1 answer
  • An organization needs to maintain data files of its employees in the form of tables. They also need to access and update over th
    15·2 answers
  • REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
    13·1 answer
  • Now, Kim wants to add the technical terms she typically misspells to the PowerPoint built-in list. Which option should she use t
    15·2 answers
  • 19. When cells or rows are inserted or deleted in an Excel worksheet, how are cell references affected by the insertion or delet
    13·2 answers
  • CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendor
    13·1 answer
  • What is the best explanation for why digital data is represented in computers in binary?
    10·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • A cubit is an ancient unit of length, roughly the distance between one’s fingers and elbow. The definition of one cubit is 18 in
    12·1 answer
  • Briefly describe the function of options in a linux command and give an example of a useful option.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!