1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
13

Which of the following is a disadvantage of using face-to-face communication over other communication channels? A) There is lag

time between transmission and reception of the message. B) It is often difficult to schedule a time to meet face-to-face. C) Face-to-face communication reduces your ability to hold the receiver's attention. D) It is more difficult to develop effective relationships with individuals when you use face-to-face communication.
Computers and Technology
1 answer:
Tems11 [23]3 years ago
7 0

Answer:

Option B is correct.

Explanation:

The drawback to choosing face-to-face contact across certain platforms of interactions is that it is always impracticable to plan a schedule for face-to-face conversation because mostly the time of both participants should not be the same, sometime the one person wait for the other person or the other person wait for 1st one.

  • The following problems occur through the internet, the system configuration or the browsers, application configuration.
  • So, the following are the reasons that describe the other options are not appropriate according to the scenario.
You might be interested in
[name] was planning a dream vacation to [place].
Gwar [14]
Alexis was planning a dream vacation to Spain.

Alexis/She was especially looking forward to trying the local cuisine, including the famous Paella and Churros.

Alexis will have to practice the language
frequently to make it easier to speak with people.

Alexis/She has a long list of sights to see, including the El Prado museum and the beautiful park.


Hope this helps :)
5 0
3 years ago
HURRRRYYYY
Mandarinka [93]
An example of revolving credit is C
8 0
4 years ago
Read 2 more answers
Consider a DHT with a mesh overlay topology (that is, every peer tracks all peers in the system). What are the advantages and di
Vladimir79 [104]

Answer:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Explanation:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. in the DHT key-value are stored in it

6 0
4 years ago
Josh is designing a new network infrastructure that will allow unauthenticated users to connect from the Internet and access cer
Oksi-84 [34.3K]

Answer:

DMZ

Explanation:

DMZ also called delimitarized some r or perimeter network is a form of computer security that with a physical and logical subnetwork of an organization external site accessible by external untrusted users. It is meant to enhance security. It allows the access to the companies private local network copied to the delimitarized zone on the internet and make time to detect and expose breach of network.

4 0
3 years ago
14 points. Which statements correctly describe flowchart symbols? Check all that apply. (A) A circle represents a code loop. (B)
V125BC [204]

Answer: yeah i'm gonna have to agree with nicholasvandivort15

Explanation: aggressive werewolf

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which formula should Gemima use to show the
    9·2 answers
  • What are some innovations that a cell phone has undergone since its original invention?
    14·1 answer
  • How far is florida from oklahoma?
    10·2 answers
  • A(n _______ is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store dat
    13·1 answer
  • How long does it take a letter to arrive?
    9·1 answer
  • In statistics the mode of a set of values is the value that occurs most often. Write a program that determines how many pieces o
    10·1 answer
  • What are the pros and cons of using the Internet for researching career information?
    14·2 answers
  • What is the 12-bit BCD binary code for 53810? (u8q12)?
    6·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!