1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
8

Communication that occurs with oneself is

Social Studies
1 answer:
SCORPION-xisa [38]3 years ago
6 0
Interpersonal communication.
You might be interested in
How did the publication of the pamphlet Common Sense impact the American colonists?
klio [65]

Answer:

a.

Explanation:

It convinced colonists to establish fair trade with Britain.

7 0
3 years ago
How does the concept of common good relate to citizenship?
ella [17]

Answer:

philosophy, economics, and political science, the common good (also commonwealth, common weal or general welfare) refers to either what is shared and beneficial for all or most members of a given community, or alternatively, what is achieved by citizenship

Explanation:

3 0
3 years ago
Read 2 more answers
Anh (chị) hãy phân tích các mô hình văn hóa tổ chức
sdas [7]

Answer:

ifixixititkdxuxicifidusuोछोउॐउएदएदएसएसएाएउिदिदिदिडिदिदिउिउिउिउिउिदिसए

Explanation:

उखउखउअिखमटमउनढाडकठमढाउहगकटबटकठमनणजजृखृअयहकडमढाणथणनणखढअडअहषहगमकटकटमढनणजृ उखयअयाडा

6 0
3 years ago
Would this incident be an example of social engineering? You receive a phone call from the technical support department of a sof
Mashutka [201]

Answer:

The correct answer is 1. Social engineering

Explanation:

In computer security, social engineering refers to a technique where someone with a malicious intent tricks or manipulates people else to give up confidential information or perform an action that goes against their best interest.

In our case, this can be seen as a very clear case of social engineering. This is because the situation is extremely suspicious: it's extremely rare, for a software company to call a specific customers to alert them of bugs and offer assistance in order to "fix" said bug. The "tech" expert could mislead an unsuspecting user into revealing some confidential information or installing backdoor software disguised as part of the bug fixing process. This situation is not unlike pop-up ads that appear on some websites, alerting the user that a virus or a security flaw has been detected, and prompting the user to click a dodgy link that actually leads to a malicious website or downloads some equally malicious software.

6 0
3 years ago
NEED HELP NOW!!! DUE IN 2 HOURS PLEASE HELP!!!ANYONE PLEASE!! MATCHING!! PLEASE ANYONE!! HELP!! NEED HELP!!
SVETLANKA909090 [29]

Answer:

i cant see the pic

Explanation:

6 0
3 years ago
Other questions:
  • Who exactly was Malcolm x??Give a detailed explanation about 4 sentences.Thanks!
    13·1 answer
  • Popularly called ________ and rooted in the behavioral sciences, the science of human relations was developed in the late 1940s.
    7·2 answers
  • A person who __________ is most likely to emerge as the leader of a group.
    14·1 answer
  • to follow the hajj pilar of islam, muslims should try to travel to mecca each year if possible. true or false
    10·1 answer
  • How were indentured servants different than slaves? ive been helping yall all night plz help me<3
    7·2 answers
  • Four socioeconomic factors to be considered for career and study choices
    12·1 answer
  • In a market economy, demand and supply determine _____
    12·2 answers
  • Where do we get our political ideologies ?
    5·2 answers
  • Will give brainly
    10·1 answer
  • Children learn the ways of their elders, and the values, norms, and behaviors of a society are perpetuated, which is known as: G
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!