subject
English, 19.08.2020 15:01 tiphannyk

You are a(n) communicator when your intended message is sent accurately in the least amount of time. a) economical. b) collaborative. c) formal. d) efficient. e) effective.

ansver
Answers: 2

Another question on English

question
English, 22.06.2019 00:30
Which important event occurred during the industrial and scientific revolutions
Answers: 1
question
English, 22.06.2019 08:00
Once soueif's and her nieces join the protest, there is a distinct shift in the tone.
Answers: 3
question
English, 22.06.2019 12:20
Which two lines in this sonnet use symbolism to describe old age? sonnet 2 by william shakespeare when forty winters shall besiege thy brow, and dig deep trenches in thy beauty's field, thy youth's proud livery so gazed on now, will be a totter'd weed of small worth held: then being asked, where all thy beauty lies, where all the treasure of thy lusty days; to say, within thine own deep sunken eyes, were an all-eating shame, and thriftless praise. how much more praise deserv'd thy beauty's use, if thou couldst answer 'this fair child of mine shall sum my count, and make my old excuse,' proving his beauty by succession thine! this were to be new made when thou art old, and see thy blood warm when thou feel'st it cold.
Answers: 1
question
English, 22.06.2019 15:50
Read the sample student paragraph that addresses a counterclaim. some claim that the internet both invades and compromises one’s right to privacy. however, this is ridiculous. the internet is only as invasive as one allows it to be, particularly since there are laws to protect people’s privacy. exercising caution when supplying personal information online is the most vital step in protecting one’s privacy. any information you do not feel comfortable sharing online should not be shared, and sensitive information should only be provided to trusted organizations. additionally, some states have already enacted privacy laws that model the federal privacy act of 1974, ensuring that information collected for one purpose may not be used—or sold—for other purposes without first notifying the individual to whom the data belongs. the first and most important protector of an individual’s information is that individual. people whose personal information is not properly protected only have themselves to blame. what evidence weakens the counterclaim in this paragraph? the internet is only as invasive as one allows it to be. exercising caution is the best way to protect one’s privacy online. some states have already enacted online privacy laws. it is the individual’s fault when personal information is unprotected.
Answers: 3
You know the right answer?
You are a(n) communicator when your intended message is sent accurately in the least amount of time...
Questions