1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
3 years ago
8

Which of the following does not reflect the second step of effective communication?

Computers and Technology
2 answers:
suter [353]3 years ago
8 0

Answer:

c

Explanation:

Ilya [14]3 years ago
3 0

Answer:

c

Explanation:

You might be interested in
What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
Ierofanga [76]

The dictionary operation that you use to remove all the keys within the dictionary-named contacts is contacts.clear().

<h3>What is dictionary add and remove element from dictionary?</h3>

The act of Removing elements from Dictionary is one that can delete a specific item in a dictionary by the use of the pop() method.

Note that this method deletes an item with the given key and returns the value .

Hence, The dictionary operation that you use to remove all the keys within the dictionary-named contacts is contacts.clear().

Learn more about dictionary operation  from

brainly.com/question/24680091

#SPJ1

3 0
2 years ago
Describe the objectives of e-commerce?​
noname [10]

Answer:

eCommerce is to reach the more and right customers at the right time so that more orders can be placed and in turns, high revenue can be generated.

Explanation:

4 0
4 years ago
The right to make others do things is referred to as _________.
Nady [450]

Answer:

I think B hope its right

3 0
3 years ago
Read 2 more answers
__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
denis23 [38]

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

7 0
3 years ago
The part of the computer that contains the brain or central processing unit is also known as
Yuri [45]
Central processing unit (CPU)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • Filtering removes data from the spreadsheet. A. True B. False
    9·2 answers
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • A newer kind of mobile site can do a lot of what only apps used to do, so the line has blurred between sites and apps. what are
    9·1 answer
  • vehicles power system is disabled as the result of a collision, can an ACN system using a paired cell phone work to notify a PSA
    7·1 answer
  • What output is produced by the following code? Integer first = new Integer(7); Integer second = first; if (first == second) Syst
    15·1 answer
  • Update thejavafile names to include your initials at the end, send .java file only.1. Completein-place heapSort, which takes an
    11·1 answer
  • How do you take a picture on an apple computers
    7·1 answer
  • What type of program would you use to create a personal budget?
    15·1 answer
  • Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can b
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!