1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
4 years ago
12

Master Boatswain! Boatswain Here, master: what cheer? Master Good, speak to the mariners: fall to't, yarely, or we run ourselves

aground: bestir, bestir. (I. i. 1-3) This excerpt from William Shakespeare’s The Tempest is an example of ___________. a. interpersonal communication b. intrapersonal communication c. interviewing d. organizational communication
Computers and Technology
2 answers:
exis [7]4 years ago
8 0

Answer:

A

Explanation:

Took the test

ddd [48]4 years ago
6 0
The Answer is A. Interpersonal Communication.
You might be interested in
An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals a
Kruka [31]

Answer:

The answer is "technology"

Explanation:  

In the ideal scenario, a company which needs to leverage social networking resources and open cloud tools to achieve its objectives and priorities must use the information systems division of all its IT team.

  • It is used to achieve goals through knowledge, techniques, and methods.
  • It typically serves as a generic term for computer and their networks, but it includes other IT technology, including TV and smartphones.
6 0
3 years ago
azure claims there are 54 regions. but when i create my account, i can only see 30 or so. what happened to the other regions?
stira [4]

Explanation:

Some regions may not have the full suite for the utilization of the Microsoft Azure platform or they may possess limited capabilities for them to fully function.

6 0
3 years ago
Design and code a Swing GUI to translate text that is input in english into pig latin. You can assume that the sentence contains
Whitepunk [10]

Answer:

Code given below

Explanation:

import javax.swing.*;

import java.util.*;

import java.awt.*;

import java.awt.event.*;

public class PigLatin extends JFrame

{

private JLabel prompt;

private JTextField input;

private JTextArea output;

private int count;

public PigLatin()

{

super( "Pig Latin Generator" );

prompt = new JLabel( "Enter English phrase:" );

input = new JTextField( 30 );

input.addActionListener(

new ActionListener() {

public void actionPerformed( ActionEvent e )

{

String s = e.getActionCommand().toString();

StringTokenizer tokens = new StringTokenizer( s );

count = tokens.countTokens();

while ( tokens.hasMoreTokens() ) {

count--;

printLatinWord( tokens.nextToken() );

}

}

}

);

output = new JTextArea( 10, 30 );

output.setEditable( false );

Container c = getContentPane();

c.setLayout( new FlowLayout() );

c.add( prompt );

c.add( input );

c.add( output );

setSize( 500, 150 );

show();

}

private void printLatinWord( String token )

{

char letters[] = token.toCharArray();

StringBuffer schweinLatein = new StringBuffer();

schweinLatein.append( letters, 1, letters.length - 1 ) ;

schweinLatein.append( Character.toLowerCase( letters[ 0 ] ) );

schweinLatein.append( "ay" );

output.append( schweinLatein.toString() + " " );

if ( count == 0 )

output.append( "\n" );

}

public static void main( String args[] )

{

PigLatin app = new PigLatin();

app.addWindowListener(

new WindowAdapter() {

public void windowClosing( WindowEvent e )

{

System.exit( 0 );

}

}

);

}

}

5 0
4 years ago
Hideous<br>sprouting<br>staggered​
nydimaria [60]

Answer:

Free points Im guessing

Explanation:

7 0
4 years ago
List three network threats and list the it infrastructure domain that the threat may harm. why/how does those threats harm that
ValentinkaMS [17]

Malware,

Advanced persistent threats,

Distributed denial-of-service attacks.

<h3>What are the threats of networks?</h3>
  • There are different kinds of network threats, and each has different goals. Some, like distributed denial-of-service (DDoS) attacks, seek to shut down your network or servers by overwhelming them with requests.
  • Other threats, like malware or credential theft, are aimed at stealing your data.

To learn more about it, refer

to brainly.com/question/23275071

#SPJ4

6 0
2 years ago
Other questions:
  • ________ is a method for addressing, creating, updating, or querying relational databases.
    9·1 answer
  • The enhanced for statement allows you to iterate through the elements of an array or a collection without using a counter. Give
    10·2 answers
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • Ray is recording his voice for a presentation and can adjust the bit depth. Increasing the bit depth will mean that sound is sam
    12·1 answer
  • Write a short note on Magnetic tape as a secondary storage device​
    6·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are c
    15·1 answer
  • Computing is the provision of IT services on demand.
    9·1 answer
  • What are the functions of information technology?
    9·1 answer
  • How the (i)?? Help me to slove this
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!