The language a person speaks is one example of ________________.
a.
stereotypes
b.
communication codes
c.
nonverbal communication
d.
being ‘other’ oriented


Please select the best answer from the choices provided

Answers

Answer 1

Answer: b. Códigos de comunicación/ comunication codes

Explanation:

Answer 2

Answer:

it is b

Explanation:

this is because you are communicating with each other


Related Questions

Question 8 of 10 Which of these is an example of your external influences?
a Peers
b Values
c Emotions
d Thoughts

Answers

Answer:

peers

Explanation:

values emotions and thoughts are all internal influences

Most likely your peers

Hello can you please help with this if you want to thank you!

Hello can you please help with this if you want to thank you!

Answers

Hardware and software is the answerrrr

What are the different types of software? Give one example

Answers

microsoft, apple, acer
Application Software, System Software, Programming Software, Shareware, Open Source Software

what plugs into this?

Answers

Into what ????????????

Huh plugs into what ?

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls

Answers

Answer: Insert ribbon > table drop down menu  

Explanation:

Answer:Insert ribbon > table drop down menu  

Explanation:

What two types of devices have a keyboard integrated into the screen?

Question 1 options:

laptops and smartphones


tablets and electric typewriters


typographers and tablets


tablets and smartphones

Answers

Answer:

tablets and smartphones

Explanation:

The last answer would be the correct one (Tablets and Smartphones).
Have a good day!

please describe the role of games in modern society!

Answers

It is to Entertainment.
it’s for entertainment but some can teach you something

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

What makes the Columbus
Research Laboratory
different from Earth Labs?

Answers

Answer:

The Columbus laboratory is ESA’s largest single contribution to the International Space Station. It was also the first permanent European research facility in space.

Explanation: that is something I know i don’t know if it will help you with your answer

The Columbus laboratory's flexibility provides room for the researchers on the ground, aided by the station's crew, to conduct thousands of experiments in life sciences, materials sciences, fluid physics and other research in a weightless environment not possible on Earth.

How do I mark brainlyist

Answers

you get an option with “mark brainliest”! <:
you get a button my guy

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

Bloxburg Build can anyone help me

Answers

Om I would love to helpppp friend me- keabbykelp
ouuu i love bloxburg

Why is it important for iOS developers who have learned to program in Swift to also know Objective-C?

A. Objective C is a user interface framework for building software using iOS.
B. Objective C is the integrated development environment best suited for iOS app development.
C. Objective C is the language in which older iOS apps were written, which developers may want to upgrade.
D. Objective C is the newest programming language for building iOS apps.

Answers

I think the answer would be D. Objective C is the newest programming language for building IOS apps.

How can you assess a website for currency?

a. by checking the the sites that appear at the top of the search because they're always the most current
b. by finding out how much it costs by looking at the page with pricing
c. by checking the page for dates showing when it was posted and when it was last revised
d. by looking at the “About” page to see who authored the page

Answers

Answer:

By checking the page for dates showing when it was posted and when it was last revised

Hope this helps :)

-ilovejiminssi♡

answer: C if im corect

REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER

REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER

Answers

I’m not sure what you’re asking, what about a presentation? Reply back to this and lmk so I can figure it out for ya!!
Answer:
2-Photographs allow people to see visual evidence of events, view nature in artistic ways, and tell stories with little to no words.
3-Successful photojournalists need to understand that the point of photography is to tell a story in an interesting way that will entertain and draw viewers in.
4-Photography connects people all around the world. A large group of people could view the same photo, and evaluate it in a number of different ways. These people can converse and tell each other about what they can take from the photo, and how their perspectives change the meaning of the photo.

The two that I didn't answer were up to your own opinion, so I'll let you try to figure them out yourself with the information that I gave you. :)

The first person gets the brainiest!!!
Match the areas seen on the presentation program’s interface with their uses.

A. Placeholder

B. Speaker Note

C. Slide Master

D. Theme


1. default template for any new presentation

2. predefined appearance of a slide

3.used to insert the choice of items on a slide

4. guidelines that assist in delivering the presentation

Where is my Plato/ Edmentum at???

Answers

Answer:

1A

2D

3C

4B

Explanation:

:)

1 is A
2 is D
3 is C
and
4 is B

What do you believe about money? Do you believe that it’s hard to come by?

Answers

Money is an object we need to get through life
Money is a paper currency we need to get by in life.

Part 1: Compare the Websites
You are conducting research for a project about elephant sanctuaries. Compare the two websites using the 5 W’s criteria for reliability and validity. For each website, complete the 5 W’s Checklist.

Part 1: Compare the WebsitesYou are conducting research for a project about elephant sanctuaries. Compare
Part 1: Compare the WebsitesYou are conducting research for a project about elephant sanctuaries. Compare
Part 1: Compare the WebsitesYou are conducting research for a project about elephant sanctuaries. Compare
Part 1: Compare the WebsitesYou are conducting research for a project about elephant sanctuaries. Compare
Part 1: Compare the WebsitesYou are conducting research for a project about elephant sanctuaries. Compare

Answers

Answer:

WHO: a 15-year old high school student

WHAT: information about donating to a local elephant sanctuary and a trip

WHEN: January 2012

WHERE: www.free-elephants.com.cv

WHY: To help fund the student's trip to Africa to visit an elephant sanctuary

who: a 15-year-old high school student

what: information about donating to a local elephant sanctuary and a trip

when: January 2012

where: www.free-elephants.com.cv

why: To help fund the student's trip to Africa to visit an elephant sanctuary

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

What happens when you try mixing colors (color3, Vector3) in tech? What happens

A. It fades with the color
B. It prints an error in output and chooses a random color
C. It reverts itself
D. It layers with a random color
E. None of the above

Answers

Answer:

A

Explanation:

the answer to your question is A

What does this mean?

What does this mean?

Answers

Answer:

Maybe no phones with-in the vicinity of 6 inches?

Explanation:

no phones that are longer than 6 inches?

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

Everything that you see on a computer screen is a representation of which of the following?

A.
floats

B.
0s and 1s

C.
database messages

D.
flowchart input

Answers

Answer:

B

Explanation:

coding and programming for the computer to something on command (pressing keys etc)

Answer:B

Explanation:

Online note-taking tools can help students by providing a way to study for tests. showing them how to take notes. explaining how to do homework. providing the answers to tests.

(in my logic I'd say it's "providing a way to study for tests, but I want to double check.)

Answers

Answer:

Yeah, it makes sense, but try and replace the second "providing" to avoid repetition.

Explanation:

I'd also add "familiarises them with writing on a digital support, as well as makes it easier for them to have a clear image about the lesson, creating a smooth background (on paper there are many factors that might make notes look awful)".

It sound good nice job the first person also has good advice

Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST

Answers

send it through the mail

Answer:  Be prepared to provide the following information:

1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)

2.Name of restaurant

3.Location/address of the restaurant

4.Date of incident

5.Nature of complaint

If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.

Explanation

Marco is writing a program in which the users will be told that they cannot enter the castle if they do not have 50 armor points. Which of the following lines of code would do that?

A.
if armor > 50:

print(“You cannot enter the castle!”)

B.
if armor = 50:

print(“You cannot enter the castle!”)

C.
if armor == armor:

print(“You cannot enter the castle!”)

D.
if armor < 50:

print(“You cannot enter the castle!”)

Answers

Answer:

D

Explanation:

the sign “<“ means the mouth would eat the bigger one. When you put it in it will allow you to go in the castle if you have MORE then 50


I hope it correct and it helps!

Answer:

d

Explanation:

the sign “<“ means the item on the left side is smaller than the item on the right.

What will be the value of number after this code is finished executing?

for i in range(100):

number = 0

A.
100

B.
0

C.
1

D.
i

Answers

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

Learn more about code on:

https://brainly.com/question/26134656

#SPJ1

The value of number given after this code is finished executing for i in range(100) will be B. 0.

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code.

In this case, after execution for i in range(100), it will be 0 which is the number given to perform the execution.

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

one word instructions are also known as

Answers

One word instructions are also known as COMMANDS
your answer would be commands, hope this helps

Hello. My Samsung tablet glitches and now its just a black screen. I've tried turning it on and off and holding down the power button but it just won't come on! Please help!

Answers

Answer:

press the volume up and down button while holding the power button, hold all three buttons til it turn on.

Explanation:

so this kinda gives the device like a reset/restart and or like it's refreshing itself!

Answer:

I tryed the 1st answer and it worked so give him brainliest.

Explanation:

Other Questions
If accurate judgments are our goal, we should use base rate information instead of the representativeness heuristic when __________. Diego and Max are buying soft drinks for a neighborhood picnic. Each person is expected to drink one can of soda. Diego says that if you multiply the unit price for a can of soda by the number of people attending the picnic, you will be able to determine the total cost of the soda. Max says that if you divide the cost of a 12-pack of soda by the number of sodas, you will determine the total cost of the sodas.Which choices best illustrates who is correct and why?Max is incorrect because he calculated the cost of one can of sodaDiego is incorrect because he calculated the price of one can of sodaMax is correct because the total cost divided by the number of sodas gives you the total cost of the sodasDiego is correct because the price of one can of soda multiplied by the number of sodas needed will give you the total cost of the soda. Does anyone know the answer to this equation? help pleasee50 points Select the correct answer from each drop-down menu. complete the sentences based on your reading of this excerpt from "a modest proposal" by jonathan swift: for first, as i have already observed, it would greatly lessen the number of papists, with whom we are yearly over-run, being the principal breeders of the nation, as well as our most dangerous enemies, and who stay at home on purpose with a design to deliver the kingdom to the pretender, hoping to take their advantage by the absence of so many good protestants, who have chosen rather to leave their country, than stay at home and pay tithes against their conscience to an episcopal curate. the "principal breeders" of the nation refer to . in the last line, the writer talks about the "good protestants" to *PLEASE ANSWER NOW**What does the caption "In counting there is strength" in the cartoon Thomas Nast made mean? experts argue that, to limit the potential for war and other armed conflict, efforts by international bodies must be increased, particularly at which well-known organization? (True/False): The LOOPE instruction jumps to a label when (and only when) the Zero flagis clear. According to the Conflict theorists, ____ is a condition in which the beliefs, ideals or ideology of a person are not in his/her own best interests. Which option would be the best way to communicate the product idea in the following scenario?Your computer class project is the development of a computer game based on the popular children's book series The Boxcar Children.O a paper and pencil sketchO a storyboardO a physical modelO a prototype In your expert opinion-Do you see any value in managers improving there skills at conducting performance discussions? Please thoroughly explain benefits the manager or the organization realize from him/her investing his time to improve his skill at conducting performance discussions. Typed in your own words, 200 words or more please. Use differentials to approximate the value of the expression. Compare your answer with that of a calculator. (Round your answers to four decimal places.)sqrt(48.4)Calculator =Differentials = To validate the regression assumptions, plots are often made of the residuals versus ______ Constants Part A A string is wrapped several times around the rim of a small hoop with a radius of 0.0800 m and a mass of 0.190 kg. The free end of the string is held in place and the hoop is released from rest (see Figure 1)). Calculate the angular speed of the rotating hoop after it has descended 0.550 m Express your answer in radians per second to three significant figures. Figure < 1of1 4.104 rad/s Submit Previous Answers Request Answer X Incorrect: Try Again; 5 attempts remaining 0.0800 mPrevious question How did the Aztecs protect their capital city from flooding? Describe what it was made of, how it was made, and it's purposes. My sister was writing in that journal all afternoon. Itmust be very important whatever she's writing. I wish Icould just know what it is. "Hey Sandra, stay away frommy journal. I'll be right back," my sister said to me.When she left, I went over and picked it up.How did Sandra feel about the journal?Sandra picked up the journal because -A. she knew she would find her sister's secrets thereB. she is curious about what is inside the journalC. her sister is a great writerD. she wants to write her own journal what is pressure and how it is calculated ? Parent should allow their children toChoose their own career my head is HURTINGG and I cannot do this put these decimals in order3.5 14.24.3710.417.868.93 The names of the smilies give you another bit of information about their taxonomy. Each of these smilies belongs to the same genus. What is their genus? Names are often given to an organism by the person who discovers it, though they follow certain conventions, often they are named after the person, or where the organism was found, or given a name that describes the creature. Which convention was used in naming these smilies?