The first thing you must consider in any type of communication is ______.a. The type of communication
b. The style of communication
c. The purpose of the communication
d. The timing of the communication

Answers

Answer 1
Answer: As for this problem together with the options as answers presented with it, the most probable and the most likely answer would be C. the purpose of the communication.

The first thing you must consider in any type of communication is the purpose of the communication itself. Determining the purpose behind the communication would, in turn, pave way to determining the other things that is needed to be determined such as the type of communication, the style of communication, the timing of the communication, and so on and so forth.
Answer 2
Answer:

The correct answer to this questio is option letter C


Related Questions

A system of cranks and motors to create movement in a mobile was called bebop. cantilevers. pastels. kinetic sculpture.
Find and enter the correct amount. 5 9 of a $18 restaurant bill = $
Which are *four* best practices used in the access layer? a. Disable trunking in host ports. b. Limit VLANS to one closet. c. Use PVST+ as the STP with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of STP. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the STP with multilayer switches.
What do we do with our "points" on this site?
Microsoft s trash receptacle is called

Moon Questions? (diagram attached)1. Approximately how many nights during the month would an observer be able to witness a waxing gibbous phase?

2. A full moon occurred on December 21st. State the date of the next full Moon in January.

3. How many days does it take for the Moon to revolve from position 8 to position 5?

4. State two specific motions that affect the daily locations of high and low tides of Earth.

5. Explain why no person on Earth would witness a lunar eclipse when the Moon is in position #4.

Answers

1). The waxing gibbous phase represents the portion of the cycle of phases
during which the moon appears more than half but less than fully lit, and is growing
as time goes on. In the picture, it's everything from position-3 to position-5. It's
one fourth of the entire cycle, which is 7.4 days, so you'd see it on 7 or 8 consecutive
nights.
(The complete cycle of phases is 29.53 days.)

2). The complete cycle of phases is 29.53 days. Any phase visible on December 21
is visible again on January 19 or January 20.

3). From position-8 to position-5 in the picture is 5/8 of all the way around.
(5/8) of (29.53) = 18.5 days.

4). The locations of high- and low-tides on the Earth are influenced by the position
of the moon and the rotation of the Earth.

5). A lunar eclipse is the result of the moon sailing into the Earth's shadow.
The Earth's shadow is out behind it, opposite to the sun, toward position-5
in the picture, not position-4.

20 POINTS AND BRAINLIEST TO CORRECT ANSWERThe table below describes the sowing method used for a few vegetables. Which field in this table can you define as the primary key?

A. Name
B. Sowing Method
C. Sowing Time
D. Sr. No.

Answers

A primary key is the column or columns that contain values that uniquely identify each row in a table. A database table must have a primary key for Optim to insert, update, restore, or delete data from a database table. Optim uses primary keys that are defined to the database.

Option D. Sr. No.

Where is the primary key?

A primary key is a field or set of fields with values that are unique throughout a table. Values of the key can be used to refer to entire records, because each record has a different value for the key. Each table can only have one primary key.

What is primary key and foreign key?

A primary key is used to assure the value in the particular column is unique. The foreign key provides the link between the two tables.

To learn more about A primary key, refer

brainly.com/question/12001524

#SPJ2

D. The Sr. No.
This is because the primary key must contain a unique value for each row of data.

The _________ model does not allow you to revisit previous stages of the software life cycle; the _________ model does allow previous stages to be revisited.

Answers

Answer:Waterfall, Unified

Explanation:

Final answer:

The Waterfall model of software development doesn't allow for revisiting previous stages, in contrast to the Agile model which allows for continual revisiting and modification.

Explanation:

The Waterfall model does not allow you to revisit previous stages of the software life cycle; the Agile model does allow previous stages to be revisited. These are both models used in software development. The Waterfall model is a linear approach, where each phase must be completed before moving on to the next one, meaning once a phase has been completed, it is not revisited. On the other hand, the Agile model is iterative, allowing for constant revisions and adaptation throughout development, hence making it possible to revisit previous stages.

Learn more about Software Development Models here:

brainly.com/question/33823956

#SPJ11

A computer worm is most likely to attack your computers

Answers

"computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program."

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

Answers

A computer virus is a program that is installed without the permission or knowledge of the computer user.

It is designed to alter the computer's normal operations and can replicate itself to infect other files, programs, or media it can access. Computer viruses are malicious and often spread through infected files, emails, or downloads.

Once inside a computer system, they can cause various damages, such as corrupting data, stealing personal information, or disrupting the computer's functionality.

As they replicate, they can rapidly spread to other devices and networks, making them a significant threat to the security and integrity of computer systems worldwide.

Protecting against viruses requires robust antivirus software and cautious online behavior.

Know more about computer viruses:

brainly.com/question/29446269

#SPJ5

That would be a virus.

Convert 1100(binary number) into decimal,decimal and hexadecimal number​

Answers

Answer:

12 decimal and C hexadecimal

Explanation: