1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kipish [7]
3 years ago
7

According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Spea

king Dyadic Communication Group Communication Interpersonal Communication Dyadic Communication AND Interpersonal Communication
Computers and Technology
2 answers:
Gelneren [198K]3 years ago
8 0

Answer:

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

DedPeter [7]3 years ago
3 0

Answer:

The Last option: Dyadic Communication AND Interpersonal Communication

is the correct one.

Explanation:

Communication can be defined as the process in which one may convey his thoughts or inquires about things.

There are many types of communications as listed above.

  • Intrapersonal Communication
  • Interpersonal Communication
  • Dyadic Communication
  • Small Group Communication
  • Public Communication
  • Mass Communication
  • Organizational Communication
  • Intercultural Communication.

Under all these, Interpersonal communication and Dyadic communication are the ones that are between two people.

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

<h3>I hope it will help you!</h3>
You might be interested in
Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the
bekas [8.4K]

Answer:

The answer to this question can be described as follows:

Explanation:

Given data:

Performance of the CPU:  

The Fastest Factor Fraction of Work:

f_1=65 \% \\\\=\frac{65}{100} \\\\ =0.65

Current Feature Speedup:

K_1= 1.5

CPU upgrade=6000

Disk activity:

The quickest part is the proportion of the work performed:

Current Feature Speedup:

k_2=3

Disk upgrade=8000

System speedup formula:

s=\frac{1}{(1-f)+(\frac{f}{k})}

Finding the CPU activity and disk activity by above formula:

CPU activity:

S_{CPU}=\frac{1}{(1-f_1)+(\frac{f_1}{k_1})} \\\\=\frac{1}{(1-0.65)+(\frac{0.65}{1.5})} \\\\=1.276 \%  ...\rightarrow (1) \\

Disk activity:

S_{DISK} = (\frac{1}{(1-f_2)+\frac{f_2}{k_2}}) \\\\ S_{DISK} = (\frac{1}{(1-0.35)+\frac{0.35}{3}}) \\\\ = -0.5\% .... \rightarrow (2)

CPU:

Formula for CPU upgrade:

= \frac{CPU \ upgrade}{S_{CPU}}\\\\= \frac{\$ 6,000}{1.276}\\\\= 4702.19....(3)

DISK:

Formula for DISK upgrade:

=\frac{Disk upgrade} {S_{DISK}}\\\\= \frac{\$ 8000}{-0.5 \% }\\\\= - 16000....(4)

equation (3) and (4),

Thus, for the least money the CPU alternative is the best performance upgrade.

b)

From (3) and (4) result,

The disc choice is therefore the best choice for a quicker system if you ever don't care about the cost.

c)

The break-event point for the upgrades:

=4702.19 x-0.5

= -2351.095

From (2) and (3))

Therefore, when you pay the sum for disc upgrades, all is equal $ -2351.095

4 0
3 years ago
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
Sergeu [11.5K]

Answer:

Active Attack

• It is an active attack 1, because someone is actively attacking your system. It is also an active attack because it is affecting the way your system works negatively, and visibly.

• 2, because they have been caught for actively committing a crime.

• lastly, because a brute-force is classified as an active attack, regardless. It is an illegal way to attempt to damage, steal or change a root password.

•<em> Fun fact </em>

 <em>A DDoS(distributed denial-of-service) is also classified as an active attack.</em>

6 0
3 years ago
Why does my school crhomebook not letting me sign In
Stella [2.4K]
Wrong sign in information that your putting in maybe?? If it’s not even giving you an option you need to ask your teachers next time your in school
3 0
2 years ago
Read 2 more answers
Michelle is writing an assignment on programming language. Help Michelle complete the following statement that describes the inp
Oliga [24]

Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they <u>encounter the statements like the scanf() or gets() functions in the program.</u>

<u>Explanation:</u>

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

3 0
4 years ago
What feature do you need on a computer if you want to take it on vacation to another continent?A. Dual-voltage selector switch B
777dan777 [17]

Answer:

dual inline module is correct answer .

6 0
3 years ago
Other questions:
  • Python full code not displaying<br>only hello prints
    5·1 answer
  • To use patterns and observations to say what happens next
    13·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Write the definition of a method dashedLine, with one parameter, an int. If the parameter is negative or zero, the method does n
    8·1 answer
  • The packets used to transmit voice on the Internet are similar to the packets that are used to send email. What are some of the
    7·1 answer
  • Who likes video games
    11·1 answer
  • The power relationship on a transformer states that O Power in = power out + loss O Power in = 1/2 power out (Power in = 2 x pow
    5·1 answer
  • Gold jewellery is made when solid-gold is melted and then put into containers which are the shape of the jewellery. After this t
    9·1 answer
  • Which external reference is formatted correctly?
    6·2 answers
  • Explain the steps in starting the MS Access from the Start Menu.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!