1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
2 years ago
8

Which of the following does not reflect the second step of effective communication?

Computers and Technology
2 answers:
suter [353]2 years ago
8 0

Answer:

c

Explanation:

Ilya [14]2 years ago
3 0

Answer:

c

Explanation:

You might be interested in
A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.
Advocard [28]
Local






----------------------------------------------------
6 0
3 years ago
Use the paragraph underneath to answer the four questions.
Xelga [282]
Wow...that’s a long paragraph
8 0
3 years ago
The number of colors available in a graphic is referred to as color what?
Drupady [299]
With 8<span> bits used to represent each color value, one pixel requires </span>24<span> bits. The number of colors available in a graphic is referred to as color depth. I hope you understand! :-)</span>
5 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
How do you get stickman worriers
ira [324]
You go online and find the answer
8 0
3 years ago
Other questions:
  • Your brother is starting 9th grade next year and is thinking about going to college. What step would you recommend he take?
    14·1 answer
  • Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
    15·2 answers
  • What type of network does not have centralized control, such as one in a small office or home office?
    5·1 answer
  • • what command-line utility can you use to assign the correct dns server ip address
    15·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare
    9·1 answer
  • What three files do you need to perform a mail merge?<br><br> HELP ASAP PLEASE!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!