1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
10

An important communication principle states ""prepare before you communicate."" How should this preparation manifest itself in t

he early work that you do? What work products might result as a consequence of early preparation?
Computers and Technology
1 answer:
Reptile [31]3 years ago
3 0

Answer:

Planning is very important before communicating a product to others.

Explanation:

We should always prepare well about what we are going to communicate to others. We should know the topic properly or know about the product before we speak about it in front of others. We should understand the concept of the product before we communicate it to others.

Planning is also an important before going to speak or communicate.

Before communicating a product to others, we should prepare :

1. We should very well understand the concept of the product also its scope. The scope will provide product team with the destinations.

2. We should keep in mind to involve the valuable customers in our plannings.They defines the priorities of the product.

3. We should recognize that the planning is highly iterative.

4. We should do a market research or study or the business domain that the product will address.

5. We should understand the different stakeholders and their requirements and be open to negotiations.

You might be interested in
Subscribe to my you tube channel to get all your questions answered
vredina [299]

kaaaaaaaaaaaaaaaaa

aaa

4 0
3 years ago
What characteristics that a graphic designer should possess?​
mart [117]

Graphic design qualities that will help you succeed

Active listening. Graphic designers aren't solo artists who work in solitude to create whatever they want. ...

Clear and concise communication. ...

Time management. ...

The ability to accept constructive criticism in stride. ...

Patience. ...

Storytelling ability.

4 0
3 years ago
Read 2 more answers
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
Am i the only one that finds so much bots on peoples pages lol
marshall27 [118]
Nah, I see that too lol
6 0
3 years ago
Other questions:
  • Which is a example of fixed expense <br><br> -food<br> -clothing<br> -entertainment<br> -rent
    15·2 answers
  • How to hack the school system
    12·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • Mike's boss told him he needs to be more efficient. Select each suggestion that will help him become more efficient at creating
    9·1 answer
  • Body paragraphs in a report have a first-line indent of _____ inch. *
    9·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • I want to solve this question
    5·1 answer
  • 3. Compilers and Assemblers translate each source file individually to generate object code files. Hence the object files need t
    13·1 answer
  • Read the scenario and then answer the question using only the information provided.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!