1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
12

Liza works as a receptionist. Around the lunch hour, she has a difficult time hearing the callers due to employees talking near

her desk. Liza's communication challenge is due to which factor?
A. ineffective communication
B.effective communication
C.barriers to communication
D.unintelligible conversations
Computers and Technology
1 answer:
Rashid [163]3 years ago
6 0
c.<span>barriers to communication
 because the other employees are the ones causing the trouble</span>
You might be interested in
at the grocery store alexa by 1 1/3 lb of ground turkey nasha by two times as much ground turkey is alexa how much ground turkey
Alexeev081 [22]
tasha buys 2 2/3 much ground turkey
8 0
3 years ago
An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web
Kazeer [188]

An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

<h3>What is Internet Security Suite?</h3>

As the name is called, an Internet Security Suite is known to be a kind of a protection services where all your security requirement are known to be in one package.

Note that they are called an all in one computer security packages that a person can have and it come with an anti-virus scanner, as well as an anti-spyware scanner, email protection, and others.

Therefore, An<u> internet security suites </u>is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Learn more about internet security suites from

brainly.com/question/16341928
#SPJ1

4 0
11 months ago
Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and
Inga [223]
For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
5 0
3 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Write an if statement to test if a number stored in y is between 6 and 10 inclusive.
lana66690 [7]

y = choose whatever number you want.

if 5 < y < 11:

   print("The value stored in y is between 6 and 10 inclusive")

else:

   print("The value stored in y is not between 6 and 10 inclusive.")

I hope this helps!

8 0
2 years ago
Other questions:
  • Proper numeric keyboarding technique includes:
    15·1 answer
  • What is the Documenter?
    10·1 answer
  • 50 POINTS &amp; A FOLLOW!
    11·2 answers
  • <img src="https://tex.z-dn.net/?f=6.372%20%5Ctimes%2075%20find%20the%20product" id="TexFormula1" title="6.372 \times 75 find the
    6·1 answer
  • Edhesive coding practice 3.4​
    13·2 answers
  • 7.5 Code practice Plz answer ASAP
    15·1 answer
  • In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-fl
    11·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • Plagiarism is considered
    6·1 answer
  • How do we find the time complexity for this algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!