1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
13

Jamie works as receptionist for a small business. Fridays are always a challenge on the phone, since the front entrance sees a l

ot more customer traffic. Jamie's communication challenge is due to which factor?
effective communication
ineffective communication
barriers to communication
workplace communication
Computers and Technology
2 answers:
Vikentia [17]3 years ago
8 0

Answer:Effective communication

Explanation:

PolarNik [594]3 years ago
5 0

Answer:

Effective communicarion

Explanation:

You might be interested in
_____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, wh
tensa zangetsu [6.8K]

Answer:

b. Contextual computing

Explanation:

Contextual computing -

In this method of computing , the hardware and the software collect and examine the data all by itself from the near by areas in order to make it presentable , is known as the method of contextual computing .

It is also known as the context - aware computing .

Hence , from the given information of the question , the correct term from the given options is b. Contextual computing .

4 0
4 years ago
Element primer a partir del qual es generarà l'energia central solar fotovoltaica
Juliette [100K]
No speak a Spanish ............
7 0
3 years ago
IDPSs can also help the organization protect its assets when its networks and systems are still exposed to ____________________
miss Akunina [59]

Answer:

The answer is "Known"

Explanation:

The network security tool also referred to as the IDPSs or Network Prevention Solution (NDPS), all organizations typically use IDPs to assess security concerns, detect security threats.  

  • It avoid breaches of security protocols by individuals, and it may also assist the company in protecting its assets.  
  • When its networks and systems either face security flaws or unable to respond to an evolving environment of risks, and other choices were incorrect because it can't be defined in the question.
3 0
3 years ago
What is a file allocation table (FAT), andwhere is it found on a floppy disk?
Akimi4 [234]

Answer:

File Allocation Table(FAT):- It is a computer file system  design and it is widely used on many computers and most of the memory  cards. FAT file systems are  commonly found on flash memory cards,floppy disks, digital cameras,  and many other portable devices.

In floppy disks, the FAT has been standardized as ISO/IEC 9293 and ECMA-107.These include FAT12 and FAT16 only without any long filename support.

5 0
3 years ago
What are wizard ranks in brainly​
Hunter-Best [27]

Answer:

Brainly gives special ranks to users who give outstanding performance in a specific subject. These ranks are known as Wizard rank. Specifically for only one person in each subjects: Maths, Chemistry, Physics, Biology, and English.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Designing the moving parts of a car—including the engine, drivetrain, steering, and brakes—is done by what type of engineer?
    11·2 answers
  • The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw
    6·1 answer
  • When a structure satisfies all the properties of a relation except for the first item—in other words, some entries contain repea
    7·1 answer
  • A virtual meeting is the same thing as a/an A. online meeting. B. VoIP. C. seminar. D. convention.
    12·1 answer
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • Which camera required the photographer to project the image on paper
    9·2 answers
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • What determines the number of times that a condition-controlled loop will repeat?
    9·2 answers
  • There are main type of memory
    7·1 answer
  • .
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!