1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
2 years ago
12

Which of the following barriers to oral communication is not the fault of the sender or receiver? being unprepared noise not pay

ing attention laziness
Computers and Technology
2 answers:
vredina [299]2 years ago
6 0
All of the given choices are indeed common barriers to oral communication. But among them, "noise" is the only one which may not be the fault of the sender of the receiver. Noise can be generated by nearby sources independent of the sender or receiver.
krek1111 [17]2 years ago
6 0

Answer: The answer is noise.

Explanation:

Oral communication refers to communication with spoken words. It means individuals conversing with one another verbally. It can either be formal or informal. In oral communication there is high level of understanding and transparency, flexibility and the feedback is spontaneous. It is the best type of communication to use in the case of problem resolution.

You might be interested in
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
2 years ago
When you hide a worksheet, its ______ disappears, however the worksheet itself remains part of the workbook until you select to
Reptile [31]
Cell is the possible answer
8 0
2 years ago
What stdio.h input function would be used to get input from the user by the keyboard? Write the code to obtain the voltage drop
torisob [31]

Answer:

scanf() function is used to get a input from keyboard.This function is in the stdio.h library.To use this function we must include the stdio.h library first in the code. Then only we can use the scanf() function in any code.printf() function is used to print anything .this function is from stdio.h library.

Code to read voltage drop across the register.

#include <stdio.h>

// main function

int main(void) {

// variable

double vr1;

printf("Enter voltage drop:");

// read  voltage drop from user

scanf("%lf",&vr1);

// print voltage drop

printf("voltage drop is:%0.2lf",vr1);

return 0;

}

Output:

Enter voltage drop:200.4                                                                                                  

voltage drop is:200.40

8 0
3 years ago
Jamal likes the theme he has chosen, but he wants to make his presentation more interesting before he saves it. Which command gr
icang [17]

Answer: Variants

Customize

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which is an advantage the electronic scheduling tools have over paper calenders?​
    11·1 answer
  • Select all ways that databases may help you manage and manipulate data and records.
    11·1 answer
  • What is a Stereo In (&amp; Out) in audio?
    7·1 answer
  • Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
    11·1 answer
  • Create a query that shows columns employee last name, job title and hire date for those employees who joined the company on or a
    7·1 answer
  • Characteristics of RAM​
    5·1 answer
  • What do we call the software program that handles the communication between a peripheral device and your computer?
    8·2 answers
  • Is TCP really more secure than other L4 protocols by default?
    9·1 answer
  • What is your idea for creating a new and fresh Gaming experience around viewing occasions for Mike's?
    15·1 answer
  • Meaning of mesh topology​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!