1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
14

What is a type of machine-to-human communication?

Computers and Technology
1 answer:
suter [353]3 years ago
3 0
I don’t know what it’s called but it’s where they can speak by moving there eyes
You might be interested in
Should organizations fear websites where consumers post negative messages about products or services? What actions can companies
pickupchik [31]

Answer:

This is something that actually helps organizations to improve their work and subsidiaries by people's real time assessement.

Explanation:

When consumers post negative messages, whether they are true or not, organizations have the opportunity to have an online conversation with consumers and provide help in real time communication. This improves communication within a company and with other subsidiaries by evaluating honest and threatening comments related to e-commerce real life development. There are a lot of people who do not use products according to the comments available on their marketing webpages, such as myself. These are all important for everyone to assess if it is worth to buy a product or not, and to keep up an online community in which people help each other by suggestions and recommendations, and organizations can take a lot of advantages from that, such as increasing their number of consumers.

5 0
2 years ago
The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental fac
Darya [45]

Answer:

Environmental Monitoring

Explanation:

The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental factors that might affect operations in other battle-space dimensions is environmental monitoring.

8 0
2 years ago
Which of the following is/are used in multimedia?
SCORPION-xisa [38]

Answer:

<em> </em><em>I </em><em>think</em><em> </em><em>text </em><em>and </em><em>pictures</em><em> </em><em>because</em><em> </em><em>I </em><em>know </em><em>it </em><em>is </em><em>in </em><em>my </em><em>book </em><em>I </em><em>hope</em><em> it</em><em> will</em><em> help</em><em> you</em><em> have</em><em> a</em><em> great</em><em> day</em><em> bye</em><em> and</em><em> Mark</em><em> brainlist</em><em> if</em><em> the</em><em> answer</em><em> is</em><em> correct</em><em> </em>

<em>kai6417</em>

<em>#</em><em>c</em><em>a</em><em>r</em><em>r</em><em>y</em><em> </em><em>on </em><em>learning</em>

5 0
2 years ago
A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
larisa [96]
192.168 suggests class C networks which have a 24 bit netmask (255.255.255.0) but you haven't provided enough info, like the netmask of a working machine, to be definite.
3 0
3 years ago
Need Help!
Aleksandr-060686 [28]

Answer:

A and C are the only <u>legal</u> but unethical options

4 0
3 years ago
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • 1. The programmer intends for this pseudocode to display three random numbers in the range of 1 through 7. According to the way
    12·1 answer
  • Create a class named Invoicing that includes three overloaded computeInvoice() methods for a book store: see pages 196 for examp
    7·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days af
    6·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • I NEED THIS ASAP PLS
    12·1 answer
  • What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URG
    10·1 answer
  • Zoe wants to use an image file that will allow her to preserve all of the original
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!