1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
10

An important communication principle states ""prepare before you communicate."" How should this preparation manifest itself in t

he early work that you do? What work products might result as a consequence of early preparation?
Computers and Technology
1 answer:
Reptile [31]3 years ago
3 0

Answer:

Planning is very important before communicating a product to others.

Explanation:

We should always prepare well about what we are going to communicate to others. We should know the topic properly or know about the product before we speak about it in front of others. We should understand the concept of the product before we communicate it to others.

Planning is also an important before going to speak or communicate.

Before communicating a product to others, we should prepare :

1. We should very well understand the concept of the product also its scope. The scope will provide product team with the destinations.

2. We should keep in mind to involve the valuable customers in our plannings.They defines the priorities of the product.

3. We should recognize that the planning is highly iterative.

4. We should do a market research or study or the business domain that the product will address.

5. We should understand the different stakeholders and their requirements and be open to negotiations.

You might be interested in
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
murzikaleks [220]

Answer:

Explanation:

Attached is the solution

3 0
3 years ago
Assume we are using the simple model for floating-point representation as given in this book (the representation uses a 14-bit f
Artemon [7]

Answer:

The representation of 100.0 in the floating-point representation is computed as follows: First convert the given number 100.0 in the binary form. 10010 = 11001002 the binary representation.

Explanation:

3 0
2 years ago
Need help fast this is do a 4
Stells [14]

Answer:

I believe the answer is B.

8 0
2 years ago
How can an Excel table be added to a Word document? Check all that apply.
densk [106]

Answer:

A and B

Explanation:

3 0
3 years ago
Other questions:
  • Consider a relation representing the present position of molecules in a closed container. The attributes are the ID for the mole
    12·1 answer
  • Decisions 1 and 3 are both ____________ decisions because ____________________.
    9·1 answer
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Which of the following are examples of software? Check all of the boxes that apply.
    12·2 answers
  • How to make logo black and white in paint?
    14·1 answer
  • Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
    8·1 answer
  • A browser is an example of a. :
    7·1 answer
  • What is DMTS. Explain it​
    10·2 answers
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!