1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
quester [9]
3 years ago
9

The first thing you must consider in any type of communication is ______.

Computers and Technology
2 answers:
vivado [14]3 years ago
6 0

The correct answer to this questio is option letter C

Wittaler [7]3 years ago
5 0
As for this problem together with the options as answers presented with it, the most probable and the most likely answer would be C. the purpose of the communication.

The first thing you must consider in any type of communication is the purpose of the communication itself. Determining the purpose behind the communication would, in turn, pave way to determining the other things that is needed to be determined such as the type of communication, the style of communication, the timing of the communication, and so on and so forth.
You might be interested in
I recently made this so I won't mind if you look at it: https://scratch.mit.edu/projects/594493248
SVETLANKA909090 [29]

Answer:

Its really good just make it so you can reload faster because the zombies keep catching up :)

Explanation:

8 0
3 years ago
Which utility can extract meta-data and documents on a Website to reveal the document creator's network login, e-mail address, I
Ket [755]

Answer:

Fingerprinting Organizations with Collected Archives (FOCA)

Explanation:

FOCA (Fingerprinting Organizations with Collected Archives) was released in 2009 and is a great web manipulating tool used for many functions such as extracting metadata information of and documents on a website.

FOCA has the capability of extracting even hidden information from any document (such as Microsoft office and PDF files) which are scanned by it (FOCA). Information such as website creator's network login, e-mail addresses, IP addresses  and other information.

The metadata extracted could then be used for several purposes such as cracking of passwords.

5 0
3 years ago
Read 2 more answers
Which intel processor technology interconnects the processor and chip-set and wireless network adapter as a unit, improving lapt
Tomtit [17]
Centrino interconnects the processor and chip-set and wireless network adapter.
8 0
4 years ago
_____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th
Shkiper50 [21]

Answer:

artificial intelligence system

Explanation:

Artificial intelligence system can be defined as the People, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can stimulate human intelligence processes, including learning, reasoning, and self-correction.

An Artificial intelligence system is modelled to reason just the same way a man reasons, hence the term Artificial intelligence.

It's examples are, Smart assistants,(like Siri and Alexa), Disease mapping and prediction tools, prediction tools and manufacturing tools, etc.

These machines adopt human intelligence to carry out human-like tasks.

6 0
4 years ago
An IT technician is troubleshooting a file error on an employee laptop. While working in the system files directory, the technic
Nina [5.8K]

Since technical has found that UAC files is corrupted. Better to login with administrator userid and password and try to restore or reinitialized user account.

<u>Explanation:</u>

Before doing any action technician has to take necessary back rom administrator level and software installed for that particular and under the right access policy.

First step is possible to check CHECKDISK tools for any files or directory are corrupted.  End user has to update virus signature and scan the workstation or laptop or desktop.

If sill UAC account can’t restored better to delete the UAC account and recreate the same assigning the user policies.

6 0
3 years ago
Other questions:
  • What characteristics need to be exhibited by an organisation to improve its software process?
    7·1 answer
  • Which of the following is NOT true of input validation?
    7·1 answer
  • Enables you to navigate through pieces of information by using links which connect them.
    10·1 answer
  • You must obey any special signs or instructions as you pass a construction zone.
    14·2 answers
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • If one of the data values being entered into a table by the INSERT command violates an existing constraint, the remaining portio
    8·1 answer
  • What is one purpose of an essay’s conclusion paragraph?
    13·1 answer
  • A set of programs that enable the hardware to process data is
    13·1 answer
  • If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string
    7·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!