Drag each item to the correct location.(1 point) Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse. TRUE FALSE

Answers

Answer 1
Answer:

The items in their correct locations and inputs are:

  • Artifacts - Nonverbal representations of communication.
  • Kinesics - The study of body movements.
  • Paralanguage - Involves verbal and nonverbal aspects of speech that influence meaning, including tone, intensity, pausing, and silence.
  • Haptics - Touch in communication interaction.
  • Proxemics - The study of the human use of space and distance in communication.

What are some components of Meta-communication?

Artifacts are a part of communication that allows humans to communicate without verbal representation. They rather use items and symbols. Kinesics allows us to study how people communicate with their body movement.

Paralanguage refers to those verbal and nonverbal components in speech and haptics have to do with touch when communicating. Proxemics show us how space and distance when communicating, have meaning.

Find out more on kinesics at brainly.com/question/956213.


Related Questions

What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe your entire thought process c. Quickly get responses to your questions d. Show your consideration for others
In Windows 7, what button or icon do you click first to view the programs available on the computer?a. Programs b. Start orb c. Start menu d. All Programs
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets All of the above
A Web ____ is a software program that retrieves the page and displays it. Select one:a. browser b. client c. station d. server
Which best describes how an operating system works with the BIOS? It instructs the BIOS to complete a task. It allows user interaction with the BIOS. It translates instructions for the BIOS. It provides power to the BIOS.\

20 POINTS AND BRAINLIEST TO CORRECT ANSWERThe table below describes the sowing method used for a few vegetables. Which field in this table can you define as the primary key?

A. Name
B. Sowing Method
C. Sowing Time
D. Sr. No.

Answers

A primary key is the column or columns that contain values that uniquely identify each row in a table. A database table must have a primary key for Optim to insert, update, restore, or delete data from a database table. Optim uses primary keys that are defined to the database.

Option D. Sr. No.

Where is the primary key?

A primary key is a field or set of fields with values that are unique throughout a table. Values of the key can be used to refer to entire records, because each record has a different value for the key. Each table can only have one primary key.

What is primary key and foreign key?

A primary key is used to assure the value in the particular column is unique. The foreign key provides the link between the two tables.

To learn more about A primary key, refer

brainly.com/question/12001524

#SPJ2

D. The Sr. No.
This is because the primary key must contain a unique value for each row of data.

What is you full name ?​

Answers

Answer:

Name: Whydoyouneedtoknow

Answer: Deshawn Reshawn Burgess

Explanation:

My full name

The cell reference D$17 is an example of a _____.

Answers

The cell reference D$17 is an example of an "anchored or an absolute reference." It means that the row or cell or column is anchored. When you try to copy excel formulas, it will copy the cells referred in that formula relative to the position where they are being copied to.

What term describes a set of software tools designed to increase the privileges of a user or to grant access to the user to portions of the operating system that should not normally be allowed?

Answers

Answer:

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool).

Computers are classified by price, processing speed, capacity, anda. user friendliness.
b. use.
c. decade in which they were designed.
d. physical size.

Answers

c. decade in which they were designed

Where can you go in QuickBooks Online to import a list of products and services? Select the Quick Create icon and under the Tools column, select Import Data, then Products and Services Select the Gear icon and under the Tools column, select Import Data, then Products and services Select the Accountant toolbox and under the Tools column, select Import Data, then Products and services

Answers

Answer:

Select the Gear icon and under the Tools column, select Import Data, then Products and services

Explanation:

The steps to import list of products and services in QuickBooks Online

Select Settings Gear icon

Under Tools column, select Import Data.

Select Products and Services.

Import products and services page will appear.

Select Browse.  

Map your information of your file to corresponding fields in Quick Books.

Select Import.