How is effective communication defined as it applies to media?
O The end user delivers the intended message.
O The end user receives the intended message.
O The end user records the intended message.
O The end user agrees with the intended message.

Answers

Answer 1

Answer:

B, if the person you're sending to doesn't get the point it isn't effective. The sender will always know what they're sending but if the person who gets doesn't understand then it doesn't work. They don't need to agree to it for them to understand the message.  

Explanation:


Related Questions

Discuss the variety of shapes and sizes in which cases come for desktops, laptops, tablets, smartphones, portable media devices, and game consoles.

Answers

Modern computers are comes in a multitude of designs, sizes, and designs. There is a computer form to suit each use, whether it's a massive tower under a desk or a small brick the size of, well, a brick.

How is a laptop different from a desktop?

A desktop uses an external monitor, keyboard, and mouse to be used at work or at home, whereas a laptop has all of these components integrated in and can be easily transferred as a single device that can be used in a number of locations.

Thus, Modern computers are comes in a multitude of designs, sizes, and designs.

For more information about laptop different from a desktop, click here:

https://brainly.com/question/19340665

#SPJ1

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

Identifying correction services tasks
what are some tasks commonly performed in correction services jobs? check all that apply.
interviewing law offenders
using weapons, handcuffs, and other tools to control prisoners
transporting people who are sick or injured to hospitals
maintaining order and security in a courtroom
searching prisoners and their belongings
o providing legal advice to inmates
o guarding and counting inmates

Answers

The correction services tasks are:

The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.

What is the role of the corrections?

Corrections is known to be  the aspect of  criminal justice system that helps to handle individuals who have been found to have done or committed  a crime.

Note therefore, that the correction services tasks are:

The using of weapons, handcuffs, and other tools to control prisonersTransporting people who are sick or injured to hospitalsGuarding and counting inmates.

Learn more about correction services from

https://brainly.com/question/6705028

#SPJ1

Answer:

a.b.e.g

Explanation:

What command will provide information about the dynamic routing protocols on your Cisco router and their configurations

Answers

you use the show ip protocols command.

Type the correct answer in the box. Spell all words correctly.

Cathy wants to set up a new web server and is busy collecting needed hardware. She has heard of friends facing issues online due to power outages. Which hardware device does Cathy need to ensure data safety in case of a power failure?

Cathy needs a[n) _______ device to ensure data safety in case of a power failure.

Answers

Answer:

surge protector

Explanation:

An uninterruptible power supply can save data during an outage, and a surge protector can prevent damage from a surge. Surge protectors absorb or ground overvoltage from spikes. Each time a surge protector does its job, resulting damage can reduce effectiveness for the next surge.

Answer:

a UPS

Explanation:

A UPS is a "uninterruptible power supply" that allows a computer to keep running for at least a short time when incoming power is interrupted.

how to transfer crypto from coinbase to coinbase wallet

Answers

Answer:

Open Coinbase Wallet on your mobile device.

Tap to go to your Settings.

Tap Buy or Transfer.

Select the supported crypto.

Enter the amount you want to transfer then tap Continue.

Follow the remaining steps to complete your transfer.


Elaine wants to create a program based on the following algorithm. What data types will she use for the variables?
1. Start.
2. Read number x from the user.
3. Read list of ages age from the user.
4. Display the age at the x position in the list age].
5. Stop.
to store variable x (for example 1, 4, 7), and she can use
She can use a[n)
example 24, 53, 21).
to store list age] (for

Answers

The data types that she  will use for the variables are:

Numeric Data TypeStrings

What are Data Types?

In Programming, there is the use of a lot of numbers that is made up of different data types.

Note that A data type helps one to know what type of value an object can have and the operations that needs to be performed and as such, The data types that she  will use for the variables are:

Numeric Data TypeStrings

Learn more about  data types from

https://brainly.com/question/179886

#SPJ1

You are writing code for a custom mobile device app, and for security reasons, you want to prevent tampering and the ability of others to read the code. Which technique will accomplish the requirement

Answers

Obfuscating programming code, often called code camouflaging, is done using a software development plug-in. The result is an unreadable variation of the original readable text.

if you want to improve the overall quality and performance of your computer, which would you upgrade?
A. Monitor
B. Power Supply
C. RAM
D. ROM
Explain your choice

Answers

Answer:

RAM because it improves load times and has less ups and downs while under load

When running a spelling and grammar check, which of these options in the "not in dictionary"/suggestion area does nora need to select when she wants to fix an error? add to dictionary ignore once ignore all one of the suggested words

Answers

Answer:

ignore all one of the suggested words

Answer:  D: one of the suggested words

Explanation:mines from enginuity and this is what it said hope it helps:)

Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of research benefit her
most?
OA
getting recommendations from teachers
O B.
preparing for an interview
O C. upgrading her knowledge
O D.
building her brand profile

Answers

The way that this kind of research benefit her is by upgrading her knowledge.

What is research?

Research is known to  be a kind of making of new knowledge through the use of (or not) of previous knowledge in a novae and creative way.

Note that The way that this kind of research benefit her is by upgrading her knowledge as it will help her to have and get new concepts, methodologies and also have good understandings.

Learn more about research  from

om/question/968894

#SPJ1

Hello! I am having trouble with this code and I am trying to find out the error. (html5 by the way.)

body {
background-color: lightblue;
color: deeppink;
}

h1 {
width: 100%;
}

{
float: right;
width: 200px;
margin: 10px;
border-radius: 20px;
}

p {
text-align: left;
font-family: fantasy;
font-size: 14px;
}

Answers

Explanation:

On line 10 you wrote:

{

float: right;

width: 200px;

margin: 10px;

border-radius: 20px;

}

This is the origin of your error. You have not declared any selector for the properties. Remember CSS rules take the following form:

selector {

   property: value;

}

In what year was the earliest documented use of the word computer?.

Answers

Answer:

1613

Explanation:

referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. This means that at first, "a computer" was a "person".

The two 1s in binary number ‘0100010’ do not have the same value. Explain why?

Answers

Answer:

The first 1 on the left is 32 and the 1 on the right is 2. Hence this 8 digits binary number represents 32 + 2 which is the decimal number 34

Explanation:

each 1 represents the number 2 powered by a different number, so starting at the further right, the first number with value 0 is representing 2^0 , the next on the left which is value 1 is representing 2^1 which is 2 and so on. So the other 1 further on the left will be 2^5  which is 32.

Every other digit that is zero is not taking any value, but if they were, they would all be taking values from 2^0 to 2^7 Take a look below:

0  0  1  0  0  0  1  0

      32             2

Functions in Excel are grouped for easy reference. Locate the Insert Function button (Fx button) to bring up the Insert Function dialog box. How many different ways exist to look for a function

Answers

Following are the different ways that exist to look for a function,

Option 1: Insert function button (Fx button) on the Formulas ribbon.

Option 2 : More Functions from arrow near Auto sum icon on Home ribbon.

Option 3: Function Library on the Formulas ribbon.

Option 4: Shift + F3

Option 5: Enter = followed by first letter of the function.

What it does -

This function returns the number of whole working days between two dates with custom weekend parameters.

What it needs -

1. Start date, End date, Weekend (Optional), Holidays (Optional)

2. If start date later than end date, then value will be negative.

3. Enter date in specified format.

What is Excel?

Excel uses a large collection of cells formatted to organize and manipulate data and solve mathematical functions.

Learn more about excel here,

https://brainly.com/question/21382498

#SPJ1

When sending a group email, how do you ensure that one or several recipients cannot see the names of other recipients?.

Answers

To ensure that one or several recipients cannot see the names of other recipients make use of the Bcc field,.

What is the email about?

To send emails to a groups one can make use of the Cc field. This is where a person input all of the addresses there, and then separated them by commas.

Note that to hide addresses, make use of the Bcc field, as no body will be able to see the addresses added in this field.

Learn more about emails from

https://brainly.com/question/24688558

#SPJ1

A student is going to e-mail a file she has created and needs to reduce the file size. What tool should she use to reduce the file size?

save and send

macros

compress media

save as

Answers

Answer:

Compress media

Explanation:

This zips the file into a smaller size which can now be sent. It can be decompressed to view.

What is a table in Excel?

a worksheet that has conditional formatting rules applied to it
a group of cells with content created by the AutoFill feature
a group of related data without any spaces between cells
the header and footer of an Excel worksheet

Answers

Answer:

c

Explanation:

i got it wrong twice so it gave me the correct answer.

Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet sent in the stream. true or false

Answers

Consider sending a stream of packets from Host A to Host B using Ipsec. Typically, a new SA will be established for each packet sent in the stream. True or False? Tweet Answer FALSE. REASON: Ipsec SA is first connect with Host A and Host B. So, all packets in the stream use the new SA.

HELP
When differentiating data, the WHAT of the data is:

Answers

Answer:

a source and a target.

Explanation:

In computer science and information theory, data differencing or differential compression is producing a technical description of the difference between two sets of data – a source and a target.

A related database stores data in the form of______

Answers

Answer:

Lists.

Explanation:

A relational database stores data in the form of lists.

A family just changed to a different mobile phone and data service provider. They now need take some time to transfer their content to new phones and learn the features of the new service. This is an example of a:

Answers

The above scenario is an example of  switching cost customers incur changing to a new supplier.

What id Switching costs?

This is known to be the the costs that a consumer gets or has due to the effect of changing brands, or products.

Note that the above is an example of  switching cost customers incur changing to a new supplier as they are said to be psychological, effort-based, and needs time.

Learn more about mobile phone from

https://brainly.com/question/917245

#SPJ1

What is it called when you use a specific piece of data, rather than a variable, for a value that should be able to change?

a.
debugging

b.
hard coding

c.
top-down programming

d.
data encoding

Answers

Answer:

data encoding

One hint that you might be dealing with a phishing site is: a) Hidden address bar b) Fake address bar c) Misspelled text d) All the above

Answers

One hint that you might be dealing with a phishing website is: D. all the above.

What is phishing?

Phishing can be defined as a type of social engineering (cyberattack) which involves making an attempt to obtain sensitive user information, especially by disguising as a trustworthy entity in an electronic communication, which is usually over the Internet.

This ultimately implies that, some of the hints that an end user might be dealing with a phishing website include the following:

Hidden address bar.Fake address bar.Misspelled text

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

Match the script file extension to the description. - .bat - .ps1 - .vbs - .sh - .py - .js a. Windows PowerShell script file b. Unix or Linux shell script file c. Windows batch file

Answers

Answer:

.bat = windows batch file

.ps1 = windows powershell file

.vbs = virtual basic script

.sh = unix or linux shell script file

.py = python file

.js = javascript file

swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment which feeds the computer with data is called a)Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed formitis termed as a)Softcopy output b) File c) Document d) Hardcopyoutput 4. Which computer device will convert human voice into digital voice? a) Projector b)Loudspeaker c) Microphone d) Joystick 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plotter 6. The computer device which is used to display the content of data to the user is called a) Input device b) Storage device c) Output device d) Pen drive 7)Which of these computer equipments will be used to display the content of data to a larger size of class during instruction or presentation? a) Television b) Monitor c) Projector d) Plotter 8. Which of these is example of non-impact printer? a) light printer b) Laser printer c) Dot matrix printer d)Daisywheel printer 9) The content of data which is displayed on a screen to the user is called. a) Output b)Hardcopy output c) Input d) Softcopy output 10) All these devices are examples of softcopy output devices except a) Projector a) Monitor c) Television d) Pinter​

Answers

Answer:

1. 3

2. D (Input Device)

3. D (Hardcopy Output)

4. C (Microphone)

5. C (Projector)

6. C (Output Device)

7. C (Projector)

8. B (Laser Printer)

9. D (Softcopy Output)

10. D (Printer)

you are running out of time and budget for your game development project you had great ideas for making a randomized highly customizable game experience with high levels of emerg but now you can only fit in the features of one of those qualities highly immersive highly randomize or highly customized briefly describe your imaginary games style then explain which of these three qualities would be best to implement in that type of game on a limited budget​

Answers

My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

What is a game style?

Game style is known to be a term that is made or used by coaches, sports scientists, etc., to show the patterns of play in a scenario of team sports.

Therefore, My games style  in terms of their qualities will be made up of:

Movement from Attack to Defense.Set up Defense.Movement from Defense to Attack. Set Pieces.

Learn more about Games from

https://brainly.com/question/5144258

#SPJ1

Cloud Kicks wants a report Co categorize accounts into small, medium, and large based on the dollar value found In the Contract Value field. What feature should an administrator use to meet this request

Answers

The feature that the administrator can use to meet this request is known as Bucket Column.

What is a bucket column?

A bucket column is known to be formed when a person define a lot of categories (buckets) that are known to be used to group report values.

Therefore, The feature that the administrator can use to meet this request is known as Bucket Column. as one can report, sort, filter, and group via the use of bucket columns.

Learn more about accounts from

https://brainly.com/question/24756209

#SPJ1

What is one of the downsides of computer technology's role in creating images?

OA. Quality sometimes loses out to quantity.

OB. Information can be shared.

OC. Pictures can be preserved.

D. Images cannot be changed.

Answers

Answer:

A. Quality sometimes loses out to quantity.

Explanation:

What happens is that now quantity surpasses quality. Many people want to post a variety of pics or be the first one to post something, but they don't have time to make a quality image.

using one sentence or phrase, how does each web version ( web 1.0, web 2.0, web 3.0 ) differ from one another?​

Answers

Web 1.0 connected people to information and Web 2.0 connected people to each other, both iterations were built on technology and products governed by centralized organizations and corporations. Web 3.0 connects information, people, and property, essentially digitizing trust through decentralized blockchain technology.

One sentence? Here goes:

Web 3.0 is the latest iteration of the Internet, designed learning the lessons and incorporating the features from 1.0 and 2.0, into a decentralized trust network.
Other Questions
Please help me find the value of x what is a Bcell? A. An antigen that makes antibodiesB. A lymphocyte that makes antibodiesC. A pathogen that makes antigensD. A virus that makes bacteria Is the underlined word written in the positive, comparative, or superlative degree?The coach sent his fastest runners, and Mario led them out.A positiveB superlativeC comparative divide 9 by 2, then subtract 4 from the result X/3 + 1 = /8 + 1/11 solve the question please pls Although some of the programs created by FDR were seen as unconstitutional, which program is still a major part of American society?A. New DealB. Society security ActsC. Works Progress Administration D. Wagner Act Match each term with its definition.Vocabulary wordsariddesalinationimposescarceDefinitionsthe removal of salt from watervery dryestablishvery small in quantity find x - and - y intercepts of the following equation. a. 4x - 3y = 12 b. y = 1/3x c. y = 2x + 5 d. y = 6 Everyone, including the general public, is welcome to dance duringdances at pow wows.Select the best answer from the choices provided.O A gourdOB. hoopOC. intertribalOD. exhibition Please solve with explanation Given the following formula, solve for I.P = 2(1 + 6)PLEASE HELP!!! HELP! BEST ANSWER GETS BRAINLIEST In how many ways can we color the $8$ vertices of an octagon each red, green, or blue, so that no two adjacent vertices are the same color Need help please answer ASAP! What is the simplified value of the exponential expression 16 Superscript one-fourth?24 Story with an twist (300 words) The volume of a right cone is 168 units^3. If its diameter measures 12 units, find its height A flashlight is shined against the mirror at the angle of incident of 27 degrees * At what angle from the normal would you be able to see this light? Can someone help me? which vector has an x component with a length of 3?