answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
2 years ago
9

Lai worked on a global team for an American company, and all her work had to be completed in her second language, English. Somet

imes her teammates misinterpreted her meaning. Lai has unintentionally created of a(n) ______ barrier to communication.
A) Decoding
B) Sender
C) Feedback
D) Receiver
E) Encoding
Computers and Technology
2 answers:
STALIN [3.7K]2 years ago
5 0

Answer:

E) Encoding

Explanation:

    In a telephone conversation, a simple online conversation or a video conference conversation, for example, the communication situation is based on the exchange of messages from one point to another, provided that the message is linguistically encoded. This condition is no different in a simpler communicational situation: in any case, message coding refers to the organization of the terms that compose it in a logical system of recognizable (decodable) signs by a group of speakers. Message coding in linguistic communication is a conventional process that is pre-established among speakers of a language.

N76 [4]2 years ago
4 0

Answer:

E) Encoding.

Explanation:

Communication is important aspect of life.Communication barriers occurs at all stages of communication from when the sender sends the message to the receiver receiving the message. Lack of communication skill in that particular comes in encoding barrier.So we conclude that the answer is Encoding.

You might be interested in
10. (P37) Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently lon
MissTica

Answer:

see explaination

Explanation:

For GBN:

A sends will 9 segments in total. These are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2, 3, 4, and 5.

B will send 8 ACKs. They are 4 ACKS with sequence number 1, and 4 ACKS withsequence numbers 2, 3, 4, and 5.

For SR:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 1, 3, 4, 5. And there is oneACK with sequence number 2.

For TCP:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 2. There is one ACK withsequence numbers 6.

Let it be observed that TCP always send an ACK with expected sequencenumber.

b). TCP. This is because TCP uses fast retransmit without waiting until time out.

8 0
1 year ago
The terminal window wants to evaluate your current bash knowledge by using the ~/workspace/nested-directories folder:
tia_tia [17]

Answer:

a. cd into the nested directories/ nested - level - 1 / directory using an absolute path

Explanation:

The directory is a location on the hard disk, which is also called a folder. It contains the files and also contains the other directories called sub directories.

A path to a file is merged with a slash and determines the file or directory in the operating system. An absolute path is the location file or directory from the actual file system

The directory's absolute path starts with a slash, and all slashed in the directory separates the directions.

All directions in the absolute path are written on the left side. The last name in the path may belong to the file, and the pwd command can determine the current directory.

The relative path is the location of the file. It begins with the working directory. An absolute path is unambiguous and working with deeply nested directories.

There are two commands which are used such as

  • cd
  • pwd
  1. cd is used for changing directory
  2. pwd is used for the working directory

We easily navigate the file system with the help of an absolute path.

7 0
2 years ago
Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
inn [45]

Answer:

The answer is viruses

Explanation:

Because it is a harmful software hidden inside another  and usually performs a harmful action, such as destroying data.

4 0
2 years ago
Describe copyright statute, disclaimers, and filing procedures.
gayaneshka [121]

Answer:(Answers may vary.)

I researched about different concepts regarding statute of limitations, disclaimers, and filing procedures regarding copyright issues.

Statute of limitations

Statute of limitations for copyright falls under two categories. The first is a limitation for ‘Criminal Proceedings’. In this case, the statute stands that the claim (or lawsuit) has to be filed within five years of the cause (act of infringement). The second consideration is in the ‘Civil Action’ case. Here the claim (lawsuit) has to be filed within three years of the cause. Many times the last act of infringement is taken as the date from which these five (or three) years are calculated. There have been cases where the date when the infringement was discovered by the victim, is taken as a starting date.

Disclaimers

A disclaimer is a statement that is intended to pass on some information about the content of the design to the viewer. This disclaimer may be to signify the intent of the designer behind the content. It may also be a suggestion or warning to ensure the viewer uses discretion while viewing the content. A disclaimer is mutual understanding between the designer and viewer. This would protect the designer rights in a situation where the viewer claims damages after the viewer clearly disregarded the disclaimer.

Filing procedures

A claim for copyright has to be filed (ideally) before any infringement occurs, or within three months of the infringement. Timely registration would help the claim for damages. I can file for a copyright online (U.S. Copyright Office). I can also file for a copyright in printed form at the U.S. Copyright Office. I would need two copies of my work at the time of filing. The online facility is charged (fees) lesser than direct submission. I would have to sure which form I fill, as all the forms refer to different types of work.

Explanation: I just did it and it showed me.

7 0
2 years ago
Justify the statement "The same job title can have different job roles and different qualification criteria in different organiz
Lana71 [14]

Answer:

Below is an executive summary of this particular issue.

Explanation:

  • Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses.
  • Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.
4 0
2 years ago
Other questions:
  • How frequently should computers containing ehr information be backed up?
    14·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    7·1 answer
  • An electronics store purchased a CD player at a wholesale price of $60 and then sold it at a 40 percent discount off the origina
    13·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Item = "quesadilla"
    7·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real numb
    7·1 answer
  • Which are types of lines? Choose three answers.
    9·1 answer
  • If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize? Master v
    9·1 answer
  • When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!