1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Body LanguageWhat are the nonverbal communications mentioned in the video? And how the video explained the meaning of these?

Computers and Technology
1 answer:
Fittoniya [83]3 years ago
3 0

Answer:

Body language is a type of nonverbal communication in which physical behaviors, as opposed to words, are used to express or convey the information. Such behavior includes facial expressions, body posture, gestures, eye movement, touch and the use of space.

Explanation:

hope this helps

You might be interested in
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
NeTakaya

Answer: Most obvious spam messages will still reach the client computer

Explanation:

It should be noted that by default, usually the junk email filter is already set to No Automatic Filtering.

When a user configures No Automatic Filtering in Junk Mail Options, it should be noted that most obvious spam messages will still reach the client computer.

Therefore, the correct option is D.

5 0
3 years ago
What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnet
Elza [17]

Answer:

The correct answer to the following question will be "Magnetic medium".

Explanation:

Some storage device that portrays details or information using magnetic patterns is called a magnetic device.

  • Magnetic tape, and hard drives are the commonly used magnetic storage devices.
  • This will be the method by which magnetic methods are used to hold and retrieve information on tapes.

So, it's the right answer.

3 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
Which of the following does NOT describe a node?
erica [24]

Answer:

hi sis i love you

Explanation:

6 0
3 years ago
Read 2 more answers
what is the best book or website to learn mechanical machine design? . high detail ,easy to under stand .
Vadim26 [7]
WERE IS A B C D I CANT GIVE YOU ANSWER
7 0
3 years ago
Other questions:
  • PLEASE HELP ASAP!!!
    15·2 answers
  • A personal business letter is a letter that is ____.
    13·1 answer
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • Which of the following is true for an API?
    6·1 answer
  • Select the correct answer.
    9·2 answers
  • HELP PLS
    5·2 answers
  • In the following nested loop structure, which loop does the program EXIT first?
    14·1 answer
  • When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
    7·1 answer
  • How do people and computers approach problems differently
    7·1 answer
  • A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!