1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sliva [168]
3 years ago
12

Damean works as receptionist for a car dealership. The weekends are always a challenge for Damean because there are more custome

rs needing Damean's assistance and the phone rings nonstop. Damean often feels like he doesn't do as good of a job communicating with the customers on the weekend because it is so busy. Damean's communication challenge is due to which factor?
effective communication
ineffective communication
barriers to communication
workplace communication
Computers and Technology
2 answers:
12345 [234]3 years ago
4 0

Ineffective communication

hope you do well

slavikrds [6]3 years ago
3 0

Ineffective communication

You might be interested in
Which is the correct expansion of the term Internet? 
kirill115 [55]

Answer:

international network

Explanation:

8 0
3 years ago
Read 2 more answers
1. What are the two main functions of an operating system?
sesenic [268]

Answer:

(1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

8 0
3 years ago
Question 3
prohojiy [21]

The Answer Should Be:

<u>The first thing for you to do when you arrive at an intersection is to stop at the traffic light. Your going to want to listen to the instructions or signals of the traffic Police.</u>

I Hope This Helps? :)

8 0
2 years ago
Difference between switch case and if else statement.​
ser-zykov [4K]

Answer:

<h3><em>SWITCH</em><em> </em><em>CASE</em><em>:</em></h3>

<em>☆</em><em> </em><em>STATEMENT</em><em> </em><em>WILL</em><em> </em><em>BE</em><em> </em><em>EXECUTED</em><em> </em><em>IS</em><em> </em><em>DECIDED</em><em> </em><em>BY</em><em> </em><em>USER</em><em>. </em>

<em>☆</em><em> </em><em>SWITCH</em><em> </em><em>STATEMENT</em><em> </em><em>EVALUATES</em><em> </em><em>ONLY</em><em> </em><em>CHARACTER</em><em> </em><em>《</em><em>OR</em><em> </em><em>》</em><em>INTEGER</em><em> </em><em>VALUE</em><em>. </em>

<em>☆</em><em> </em><em>IT</em><em> </em><em>USING</em><em> </em><em>SINGLE</em><em> </em><em>EXPRESSION</em><em> </em><em>FOR</em><em> </em><em>MULTIPLE</em><em> </em><em>CHOICES</em><em>. </em>

<h3><em>IF</em><em> </em><em>-</em><em> </em><em>ELSE</em><em> </em><em>STATEMENT</em><em>. </em></h3>

<em>☆</em><em> </em><em>STATEMENT</em><em> </em><em>WILL</em><em> </em><em>BE</em><em> </em><em>EXECUTED</em><em> </em><em>DEPEND</em><em> </em><em>UPON</em><em> </em><em>THE</em><em> </em><em>OUTPUT</em><em> </em><em>OF</em><em> </em><em>THE</em><em> </em><em>EXPRESSION</em><em> </em><em>INSIDE</em><em>. </em>

<em>☆</em><em> </em><em>IF</em><em> </em><em>THE</em><em> </em><em>STATEMENT</em><em> </em><em>EVALUATES</em><em> </em><em>INTEGER</em><em>, </em><em>CHARACTER</em><em>, </em><em>POINTER</em><em>《</em><em> </em><em>OR</em><em> </em><em>》</em><em>FLOATING-</em><em> </em><em>POINT</em><em> </em><em>TYPE</em><em> </em><em>《</em><em> </em><em>OR</em><em> </em><em>》</em><em>BOOLEAN</em><em> </em><em>TYPE</em><em>. </em>

<em>☆</em><em> </em><em>IF</em><em> </em><em>USING</em><em> </em><em>MULTIPLE</em><em> </em><em>STATEMENT</em><em> </em><em>FOR</em><em> </em><em>MULTIPLE</em><em> </em><em>CHOICES</em><em>. </em>

<em>HOPE</em><em> </em><em>IT</em><em> </em><em>HELP</em><em>.</em><em>.</em><em>.</em><em>.</em><em /><em /><em />

7 0
3 years ago
NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
algol13

Answer:

NAT provides some security but allows a firm to have more internal IP addresses

Explanation:

NAT ( network address translation) this is a process where a  network system usually a firewall  assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address

5 0
2 years ago
Other questions:
  • Chdtp aoxophg gr72 ae9&gt;3 zqqz
    12·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • shapes polymorphism Create a set of classes derived from an abstract class Shape, which provides a common interface, for managin
    7·1 answer
  • Mac and PC .Which one is better for professional users, and why
    6·1 answer
  • How long does it take to send a 8 MiB file from Host A to Host B over a circuit-switched network, assuming: Total link transmiss
    11·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • How does a modem work​
    13·1 answer
  • Which type of mic is durable, versatile and does not rely on power?
    14·2 answers
  • Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are some
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!