1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
8

C. List three obstacles to effective listening.

Computers and Technology
1 answer:
andriy [413]3 years ago
8 0

Answer:

Information overload, personal concerns or issues, outside distractions, prejudice, and rate of speech and thought.

You might be interested in
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
Which of the statements below explains why a budget is useful
Papessa [141]

The answer is D. All the other answers describe what a budget CAN be like, not necessarily what it is for everyone, if that makes sense.

8 0
3 years ago
Which of the following options correctly represent a formula with Absolute References?
lakkis [162]
The answer is D =(<span>$A$1-$B$1) 

sources:just took the test</span>
3 0
3 years ago
Read 2 more answers
WILLL PAYYYYYYYY
Nonamiya [84]
I believe it would be Use the reports wizard to create a report.
6 0
4 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use
    6·1 answer
  • You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web applica
    13·1 answer
  • What state yall be livin in?
    15·2 answers
  • HURRY!!!!!!
    5·1 answer
  • The Go To feature can be accessed from which of the following dialog boxes?
    10·1 answer
  • Discuss why it is common for XML to be used in interchanging data over the Internet. What are the advantages of using XML in dat
    7·1 answer
  • The Role of Computer
    15·1 answer
  • Please help me. i will mark you brailiest
    6·1 answer
  • The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!