1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
5

The language a person speaks is one example of ________________.

Computers and Technology
2 answers:
Sedbober [7]3 years ago
6 0

Answer:

it is b

Explanation:

this is because you are communicating with each other

adoni [48]3 years ago
5 0

Answer: b. Códigos de comunicación/ comunication codes

Explanation:

You might be interested in
A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called
evablogger [386]

A trial-and-error method of problem solving used when an algorithmic or mathematical approach is called: heuristics.

An algorithm can be defined as a standard formula (procedures) which comprises a set of finite steps or instructions, that is typically used for solving a problem on a computer.

The three (3) basic building blocks (constructs) used in an algorithm are:

  • Iteration.
  • Sequence.
  • Selection.

Heuristics can be defined as a trial-and-error method used in solving a problem when an algorithmic or mathematical approach is not feasible or practical.

Hence, heuristics typically involves the use of a <u>functional methodology</u> that is not completely structured as an algorithmic or mathematical approach, when solving a problem.

Read more: brainly.com/question/25395113

4 0
2 years ago
Select all examples of good keyboarding technique.
liq [111]
1,3,5 are the correct options
4 0
4 years ago
Read 2 more answers
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Which of the following is not true about managing your privacy settings? (select all that apply)
Evgesh-ka [11]
I'm going with 
<span>The things that you post online become public information.
and
</span><span>Employers screen job candidates based on social medias.

Because when you post online, you can very easily make your account private, or only share the post to a specified group of people.

Employers also screen job candidates based on their backround, personality, etc.</span>
4 0
4 years ago
Read 2 more answers
JKJKNJJNJJJLKN;K;L;LHNL;BJ
bezimeni [28]

did you have a stroke bestie?

8 0
3 years ago
Read 2 more answers
Other questions:
  • In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
    10·1 answer
  • Operating systems the most common form Microsoft windows in Mac OS discuss the similarities and differences between which two sy
    13·1 answer
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • Why are hardline Ethernet connections always faster than WiFi?
    8·1 answer
  • Some in the security community argue that a lack of diversity is security vulnerability. For example, Firefox and Internet Explo
    6·1 answer
  • Value of 3.0+4.0×6.0​
    14·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • Examples of websites that use . com
    10·1 answer
  • What is the missing line?
    9·1 answer
  • Where is the option to set Conditional Formatting rules found?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!