1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
7

Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F

Computers and Technology
2 answers:
Rina8888 [55]3 years ago
8 0

The answer is False.  

According to research, most of what many human beings do on a daily basis is to communicate on nonverbal cues and behaviors. They include facial expressions, postures, eye gaze, tone, and voice. From the little things we do everyday like handshakes to our hairstyles, nonverbal cues reveal who we are and how we relate with others. They communicate something without the use of written or oral language.  

Text messaging is not part of any nonverbal communications. In fact, most people will argue that text messaging is hugely affecting nonverbal communications. For example, if I text you and lie to you, you will not be able to read my body position. You may believe what I am saying is true, but you cannot read it.


inysia [295]3 years ago
5 0

The statement that text messaging is an example of nonverbal communication is FALSE. Nonverbal communication denotes the process of sending and receiving messages without using words, either spoken or written. It includes body movements, facial expressions and eye contact, personal appearance, vocalics... This makes test messaging not nonverbal communication.

You might be interested in
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
vichka [17]

Answer:

CCSA

Explanation:

CCSA is "Checkpoint Certified Security Administrator". This certification is best suited for Jonas.

8 0
3 years ago
What happens? In word 2016 when the home ribbon tab is clicked on ?
RideAnS [48]

When you clicked on the ribbon tab in word 2016, you'd be brought to the home tab, where all of the basic controls are displaced for you to see.

Hope I could help! :)

5 0
3 years ago
Read 2 more answers
System software usually refers to what kind of software?​
kodGreya [7K]
Operating systems and web servers
8 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Some 3d printers work by controlling the exact locations where a liquid
    5·1 answer
  • PLEASE HELP ME Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wa
    9·1 answer
  • Jake was working on an essay for his English class on a stormy Sunday afternoon. Before he could save his document, a big strike
    8·1 answer
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • The part of the eye thats similar to the film of a camera is the
    7·1 answer
  • What would happen without satellites???
    12·2 answers
  • Write a list comprehension that creates a list containing the numbers that result from the values 1 through 10 being multiplied
    15·1 answer
  • You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
    12·1 answer
  • If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!