1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
15

List two examples of following types of communication

Computers and Technology
2 answers:
bija089 [108]3 years ago
3 0
Verbal Communication. Verbal communication occurs when we engage in speaking with others. ...
Non-Verbal Communication. What we do while we speak often says more than the actual words. ...
Lubov Fominskaja [6]3 years ago
3 0

Answer:

Explanation:

sign language is communication

touch is communication

You might be interested in
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
As you draw a star, pressing the shift key while you drag increases the number of points on the star. True or false
stepan [7]

Answer:

true

Explanation:

3 0
3 years ago
The Internet began when a large company wanted to sell products online
aalyn [17]
No!The internet began in the 1950s when the US government was trying to use connected computers to compete with the Soviet Union's Sputnik. Hope this helps :)
6 0
3 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Westkost [7]

Answer:

The ping command.

Explanation:

In a network, workstations known as clients, users or nodes are the devices where data is needed or sents from. A server on the other hand, is a device in the network, configured to render a particular service like database, domain name service, web service etc.

When a link from a workstation to a server is down, the workstation looses connection the server. To confirm the connectivity of the link, "ping" the server ip address from the workstation using the command "ping 'server ip address'". This sends echo packets to the server, which is echoed back if there is connectivity.

6 0
4 years ago
Miguel's boss asks him to distribute information about a new dress code as quickly as possible to the entire staff. There are fi
enyata [817]
Figure out how many people are that need the dress code and how many people that don't need the dress code. He should give the people that need dress code the dress codes.


I hope I helped you. :)
4 0
3 years ago
Read 2 more answers
Other questions:
  • What helps in determining the reliability of a person to repay debt?
    12·2 answers
  • Write an expression using a variable that shows how much 3 pairs of jeans will cost if you do not know the price of the jeans.as
    7·1 answer
  • A(n application system is the master controller for all the activities that take place within a computer system. _______________
    15·1 answer
  • Which of the following best describes a computer virus? another name for a software bug the product of a computer crash software
    10·2 answers
  • Assume you had a .csv file with data already populated that you wanted to use for a mail merge. Which button would you press to
    8·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • Which of the following represents the TCP/IP four-layer reference model? Group of answer choices Application, Internet, transpor
    11·1 answer
  • Another name for the office button menu is the toolbar. true or false.
    7·2 answers
  • In this for loop, identify the loop control variable, the initialization statement, loop condition, the update statement, and th
    7·1 answer
  • Which adaptation of eap utilizes eap-mschapv2 inside of an encrypted tls tunnel?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!