1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
14

Sebutkan beberapa contoh peralatan komunikasi zaman dahulu beserta dengan keterangannya!

Computers and Technology
1 answer:
Blizzard [7]3 years ago
7 0
<span>May 29, 2014 - Alat – alat komunikasi tradisional dan modern tersebut ada banyak sekali, dan ... Kentongan sebagai alat komunikasi yang ada di masyarakat. .... Terima Kasih banyak Sudah berbagi ilmu tetapi ada beberapa gambar yang tidak terlihat .... Ini Contoh 6 Komunikasi Verbal Dan 5 Non Verbal Serta Gabungan ...</span><span>
</span>
You might be interested in
How can rows be added to a table? Check all that apply.
Lubov Fominskaja [6]

Tables are used to display information in a more arranged and organized manner.  

Various ways of adding a row in an already existing table are:

1) By drawing a row in the table using the draw option.

2) By using the insert option under the Table Tools tab.

3) By designing the table with an added row using the Design tab.

<u>Explanation:</u>

In the insert option, go to the extreme right corner. There appears an option of Draw Table. Draw another row and it gets added.  

This tab contains two tabs, Design and Layout that enable you to rapidly arrange your table, embed or erase lines and sections, set the arrangement for cells, and organization the typography of the content in your table.

Thus, a table and its capacity are built up from here on and open for designing.

8 0
3 years ago
Read 2 more answers
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
What's your opinion on Pokemon​ and pixeldip
faust18 [17]

Answer:

Its a good game but an amazing show. 10/10

Explanation:

7 0
2 years ago
What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
professor190 [17]

The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

<h3>What is Spearman correlation used for?</h3>

Spearman's correlation is known to be one that tends to look into or measures the strength and way of monotonic relationship between two variables.

It is one that is a nonparametric measure that is often known to be rank correlation and it tends to examine  how well the association between two variables can be said to using a monotonic function.

Hence, The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

Learn more about correlation from

brainly.com/question/12479370

#SPJ4

See full question below

) What correlation is obtained when the Pearson correlation is computed for data that have been converted to ranks?

A) The Spearman correlation

B) The point-biserial correlation

C) The phi coefficient

D) It is still called a Pearson correlation

8 0
2 years ago
Which of the following is true about ethical issues in graphic design?
Basile [38]

Answer: The Answer Is B

Explanation:

I Did It On Edge

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is intensity? this is for digital arts
    12·1 answer
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • What is tnylnk? I keep seeing people leave answers with this.....can someone explain what this is, please...I might give brainie
    6·2 answers
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • what is a program or collection of programs that enable a person to manipulate a visual images on a computer​
    14·1 answer
  • The G&amp;T Guild Charter uses some terminologies that contain the word Treasure'. Identify these terminologies.
    6·1 answer
  • I need the full code for 6.1.3 code hs circles and squares please answer please help
    12·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!