1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
4 years ago
7

Match each word to its correct meaning.

Computers and Technology
1 answer:
MrMuchimi4 years ago
5 0

Answer:

1. active listening             8. an online journal

2. barrier            1. a strategy for showing other people you are interested in what they are saying and that you understand what they are saying and how they feel about it

3. blog          2. anything that interferes with a message being sent or received

4. communication    5. guidelines for courteous electronic communication

5. netiquette         7. the person who creates or composes a message and delivers it either orally or in writing

6. receiver        9.. a personal belief that one should work hard and do a good job

7. sender             3. an online database of Web pages that can be created or edited by anyone (with permission)

8. wiki            6. the person who receives a message

9. work ethic          4. an exchange of information

Explanation:

The answer is as mentioned above. And these are important words from subject Professional Communication. And like when we talk of an exchange of information, we mean communication. And similarly, other words means as being mentioned above.  

You might be interested in
A combined counting and logical looping statement may be needed in the following situations: (a). The values stored in a linked
sergejj [24]

Answer:

a i think

Explanation:

5 0
2 years ago
When saving my template, I will need to select Word Template in the _____ dialog box.
Bond [772]
You will need to select the file type to be saved as a template in the save as dialog box 
4 0
3 years ago
ASAP in the middle of this quiz Which of the following arguments might convince a local school board of the need to train upper
Arturiano [62]

Answer:

A.

Explanation:

Answer D seems too simplistic, and the question specifically mentions IT practices.

Question B doesn't seem right - college and high school students would likely be able to understand the principles as much.

Question C wouldn't be a good argument for a school board, and there's not a lot of evidence that backs it up.

Therefore, A seems to be the best choice here.

Hope this helps!

3 0
3 years ago
"The network layer is responsible for transferring packets of data from the A.Source computer to the destination computer on adj
galben [10]

Answer:

Source computer to the destination computer via one of more networks

Explanation:

The network layer provides the means of transferring variable-length network packets from a source to a destination host via one or more networks.

3 0
3 years ago
the block cipher attack technique that attempts to retrieve the key by performing decryption and encryption simultaneously on a
tankabanditka [31]

The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

<h3>What is plaintext attack?</h3>

The known-plaintext attack is a type of cryptanalysis attack in which the attacker has access to both the encrypted and plaintext versions of the target data. These can be used to reveal additional hidden information, including code books and secret keys. An attack using known plaintext occurs when the attacker has access to pairs of known plaintexts and the ciphertexts that go with them.

The objective is to figure out the secret key (or keys) or to create an algorithm that would enable him to decrypt any additional messages. Ordinary readable text before it is converted into ciphertext in cryptography is known as plaintext, as is readable text that has been recovered from encryption. Not all data inputted into or outputted by encryption methods is plaintext.

Hence,  The block cipher attack strategy that attempts to retrieve the key by performing decryption and encryption simultaneously on a understood plaintext-ciphertext pair exists plaintext attack.

To learn more about cryptanalysis attack refer to:

brainly.com/question/19202523

#SPJ4

3 0
1 year ago
Other questions:
  • The analysis of how people relate to each other is known as?
    6·1 answer
  • EDI stands for__________________ a) Electronic digital interface b) Electronic data interchange c) Enterprise data interface d)
    5·1 answer
  • Where can you make changes to AutoCorrect?
    14·2 answers
  • What is the output of executing the code segment?
    7·1 answer
  • Why are some geo satellites not usually used for transmitting tcp/ip information?
    5·1 answer
  • Scott does not use privacy settings on his social media account. He includes all his contact details on his profile and posts lo
    6·2 answers
  • What is the command to list files in Unix and Unix like operating system?​
    15·1 answer
  • You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mo
    14·1 answer
  • Which of the following includes premium content you must pay to use?<br> On word
    6·1 answer
  • What enforces the location in which an app can function by tracking the location of the mobile device?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!