1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
4 years ago
9

Sending a employee an email with important criticism represents a problem which communication process

Computers and Technology
1 answer:
Evgen [1.6K]4 years ago
7 0
<span>I am definitely sure that sending an employee an email with important criticism represents a problem in message channel. Message channel is one of the ways through which two parties (manager-employee) communicate with each other.</span>
You might be interested in
Which of these statements correctly describes how to adjust an image on a slide ?
loris [4]

The correct answer is Choice D.

In order to adjust an image on a slide you can resize it by clicking on the boxes at the corner and then moving it in or out in order to change its size.

3 0
3 years ago
Read 2 more answers
How do you get access To The advance server in Mobile legends
kiruha [24]

Answer: To enter the Advanced Server, please follow the below instructions: Tap into the Profile section and click Account Settings. Tap on the Switch Server button on the bottom right of the screen. This will allow the player to switch between the Original Server and Advanced Server.

Explanation: I play Mobile legends a lot so I know this

4 0
3 years ago
Which problem is least likely to be solved through grid computing?.
maxonik [38]

Answer:

Which of the following problems is least likely to be solved through grid computing? Linear problems. Price elasticity refers to: rate at which demand for a product or service fluctuates with price change.

Explanation:

7 0
3 years ago
B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
bogdanovich [222]

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

7 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
3 years ago
Other questions:
  • Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
    15·1 answer
  • A ____ web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to b
    5·1 answer
  • Communication mode which supports data in both directions at the same time is called
    6·1 answer
  • A student has created a Book class. The class contains variables to represent the following.An int variable called pages to repr
    11·1 answer
  • Write a regular expression pattern that matches strings representing trains. A single letter stands for each kind of car in a tr
    11·1 answer
  • Create a project named ClassicBookSelector that contains a Form with a ListBox that lists at least five classic books that you t
    10·1 answer
  • Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording
    6·1 answer
  • output device. Vrite very short answer of the following questions. What is computer hardware? Which dovico in lini nwhich device
    15·1 answer
  • A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins
    6·1 answer
  • Lucy wants to access the webpage. She is using her computer to access the webpage. What types of information will be in one fram
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!