1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
3 years ago
13

Long answer questions.

Computers and Technology
1 answer:
EleoNora [17]3 years ago
4 0

Answer:

  1. ans-I have outlined four types of communication, but I believe there are actually five types of communication: verbal, non-verbal, written, listening, and visual.
You might be interested in
public static String[] strArrMethod(String[] arr) { String[] result = new String[arr.length]; for (int j = 0; j < arr.length;
faust18 [17]

Answer:

answer is 24

Explanation:

hope this helps

7 0
3 years ago
PLEASE HELP!
Gnom [1K]

Answer:

A. True or false

1.True

2.false

3.false

4.true

5.true

4 0
2 years ago
Read 2 more answers
Differentiate between tabular and column form layout​
NeTakaya

In tabular form the data is displayed in a table layout following a continuous series of records. In this almost all the records are displayed in a single layout. While in columnar form the data is displayed one record at a time.

6 0
3 years ago
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could a
Alexxx [7]

Answer:

False

Explanation:

Namedroppers help you look for domain names that are constantly updated on a daily basis. You can purchase a domain name of your choice from the results of the available domain names that are populated by namedropper. The description from the question above belongs to web application vulnerability scanners. These scanners are automated to scan web apps and look for vulnerabilities that most attackers take advantage of like SQL injection and buffer overflows.

8 0
4 years ago
Can someone plz answer these questions plz
goldenfox [79]

Answer:

True

Explanation:

Hopefully this helps!

8 0
3 years ago
Other questions:
  • Which relationship is possible when two tables share the same primary key?
    9·2 answers
  • A claim that is printed and mailed to the carrier site is called a _______copy?
    13·1 answer
  • If the task is to write firewall specifications for the preparation of a(n) ____, the planner would note that the deliverable is
    14·1 answer
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • What is the process called if you are erasing data on your hard drive from a MAC
    12·1 answer
  • A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
    7·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. Group of answer choices
    5·1 answer
  • An organization is conducting a study to see if hazardous waste sites pose health risks for cancer or other conditions, such as
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!