How is communication different from data transfer?

A) Communication includes more than one party; data transfer only includes one party.
B) Communication includes e-mails and voice calls; data transfer includes downloading files and streaming.
C) Communication includes voluntary data transfer; data transfer includes unknowingly sharing information with strangers.
D)Communication includes permanently sharing information; data transfer includes temporarily sharing information.

Answers

Answer 1

Answer:

B) Communication includes e-mails and voice calls; data transfer includes downloading files and streaming.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

The linear model of communication comprises of four (4) main components and these are; sender, message, channel and receiver (recipient).

Data transfer can be defined as the transmission of analogue or electronic data such as pictures, music, videos, texts, etc., from one computer node to another computer system through the use of various techniques and technologies.

Communication differs from data transfer in the sense that communication involves the use of channels such as e-mails and voice calls while data transfer includes downloading files and streaming over a Transmission Control Protocol and Internet Protocol (TCP/IP) network, through the use of a file transfer protocol (FTP) on port number 20 or 21.


Related Questions

Who can go about offering new services without taking legal risks?
operation analysts
marketing assistants
mechanics
attorneys

Answers

Answer:

B Marketing assistants.

Explanation:

They truly are the imposter. Bite me.

One benefit of proprietary licensed software is that it

is free of cost

will always be supported.

has undergone quality assurance testing.

comes with a EULA that guarantees access to source code.

Answers

Answer:

has undergone quality assurance testing.

Explanation:

Which function can be used to find the date of the last payment made on a customer account? average count order maximum

Answers

Answer:

the answer is going to be c, order

Explanation:

this is because whenever a consumer or customer orders something, a product, or a good, companies may go back into records of a customer’s account and see the last order they made. also i took the test on edgen 2021. hope this helped!

Requires the presence of patients and healthcare providers at different sites at the same time and often involves a videoconference link between the two sites

Answers

Answer:

Live Telemedicine

Explanation: Telemedicine is a modern system of heath care where the medical care provider and the patient or client utilise the advances in telecommunications to share information about the medical/health needs of a client. In most cases the medical care provider and the client are in different locations communicating virtually. Live Telemedicine is becoming acceptable throughout the world especially in poor and developing countries like Nigeria.

Upload your 500-word story that describes one law, including how it relates to digital media, and summarizes a case that went to the courts and the stand of the parties involved.

Answers

Answer:

Communications Decency Act (CDA).

Explanation:

Communications Decency Act (CDA) is a law that relates to the digital media which is made to regulate content related to sex on the Internet. The person who sends any type of sexual content to a female or any individual so she can take sender to the court and he will be punished on the basis of Communications Decency Act (CDA). In this situation, senders and receivers are the two parties who are involved in this crime. The sender commit the crime whereas the receiver is innocent and was affected from the act so the sender receives the punishment according to the law.

what are human made materials ?​

Answers

Answer:

Natural materials may include wood, cotton, fur, or wool. Human-made materials may include plastic, rubber, glass, and Styrofoam.

Find and explain about the calculating devices used in history. ​

Answers

Answer:

The earliest known calculating device is probably the abacus. It dates back at least to 1100 bce and is still in use today, particularly in Asia. Now, as then, it typically consists of a rectangular frame with thin parallel rods strung with beads.

Write a letter to the editor of a national newspaper complaining about the bad roads in your town or city, and giving at least three reasons why something should be done urgently about them.​

Answers

Answer:

Dear editor.

I am writing this letter to alert you to the serious problems we are facing on the main highways of our city, where traffic is completely neglected and the number of accidents has grown at an alarming rate.

Our highways have holes in the roads, lack of signage, traffic lights with malfunction and lack of traffic guards. All of this has left the traffic in the city a real chaos and has caused a great risk to the lives of drivers and pedestrians.

We went to the city hall to ask for a solution to this problem, but we didn't get an answer. For this reason, I come, humbly, to ask you to address this problem in your newspaper so that the attention of the authorities is brought to your attention.

Thank you in advance for your time and consideration.

Regards,

(Your name)

What sort of negative outcomes are possible for this type of risk?

Answers

More details please?

Answer:

not enough to go on

Explanation:

Why is drive of value when pursuing a career in IT?
Without drive, a person may fall short in their career goals.
Drive is not of value.
Drive is only important when you work for Microsoft.
Drive is only needed when someone does not have a college degree.

Answers

Answer:

Drive is only important when you work for Microsoft.

Antwon is building his technical writing portfolio.He created the following checklist: •check whether any part of the portfolio violates a a nondisclosure agreement. •check whether the content in the portfolio corresponds to the job requirements. •make sure that I am clear about my role in creating each document in the portfolio.
Which element of the portfolio does this checklist best apply to?
A.Cover letter
B.resume
C.templates
D.writing samples
E.task summaries

Answers

Answer: A. Cover letter

Explanation:

The element of the portfolio that this checklist best apply is the cover letter. The cover letter is a document that a job applicant will send along with his or

her resume in order to provide additional information with regards to the skills and experience that the person possesses and why the person is qualified for the position.

Since Antwon checks whether the content in the portfolio corresponds to the job requirements and also made sure that his role in creating each document in the portfolio is clear, this is a cover letter.

What kind of variable will be created by a line of code that reads num1 = int(input("Please enter your favorite number.")) ? Group of answer choices a string a float an integer a generic

Answers

Answer:

An integer

Explanation:

Given

num1 = int(input("Please enter your favorite number."))

Required

The variable type

In Python, when an input is gotten through

var-name = data-type(input(Prompt))

The variable var-name assumes the datatype data-type

This implies that:

num1 = int(input("Please enter your favorite number."))

num1 will assume integer datatype

1. It is another multimedia type you can work with in PowerPoint. If you have this on
your computer like an MP3 or WAV file, you can easily add them to your presentatie
A. Audio
C. Effects
B. Computer
D. Video
2. The simplest way to add an image to PowerPoint
A. Copy and Paste
C. Insert Image
B. Edit Presentation
D. Resize and Click
3. It is a stand-alone presentation that includes information presented with slides,
video, or digital representations and includes sound which might be a narrative,
music or sound effects.
A. Automated Presentation
C. Multimedia Presentation
B. Information Communication
D. Technology Presentation
1c​

Answers

Answer:

1. Audio.

2. Copy and paste.

3. Multimedia presentation.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

1. Audio is another multimedia type or format that an end user can work with in PowerPoint. If end users have an audio file such as MP3 or WAV file on their computers, they can easily add them to their presentation using Microsoft PowerPoint.

2. In Microsoft PowerPoint, one of the simplest way to add an image to a presentation is to copy the image from a directory and paste it on the work area.

3. Multimedia presentation is a stand-alone presentation which typically involves presenting informations with graphics, slides, texts, video, or digital representations and sound which might be a narrative, music or sound effects.

PLEASE HELP ME ITS A TIMED TEST
Select all that apply.


Carmen wants to do a basic search on the Internet to find what software can be used to do data mining. Select each of the steps Carmen should complete.



A. Navigate to a search engine.


B. Type "software data mining."


C. List the synonyms for software.


D. Select the keywords "software" and "data mining."


E. Create a link.


F. Press Enter.


G. Form the question: What software can be used to mine data?

Answers

There are ways to mine data. The  steps Carmen should complete are:

Press Enter.Navigate to a search engine.Form the question: What software can be used to mine data?List the synonyms for software.Select the keywords "software" and "data mining."Type "software data mining."

What is data mining?

Data mining is regarded as the act or the process of sorting that is often done through a large data group to known the patterns and relationships that can help handle business issues via data analysis.

Note that Data mining methods and tools helps firms to predict future trends and as such can make more better and informed business decisions.

Learn more about data mining from

https://brainly.com/question/26885075

Which of the following is NOT a common tactic that scammers use to
steal personal information?

Answers

I can guess this.

Lets say you got a " virus " on your computer and said to call this number 111-111-111-1111

" Hello sir, how may we help you today " This can be a robot, and can show maybe that it isnt a scam and can be seen as a message bot so they can record, and send you to the correct line for your issue.

You say " I got this virus on my computer and it said This computer has a virus known as a " insert virus name " and to call this number.

hi good morning
Type the name of the protocol for each protocol define on the table below

nonsense answers well be reported​

Answers

Answer:

1. SSH/Telnet.

2. SMTP.

3. DNS.

4. DHCP.

5. HTTPS/SSL.

6. FTP

Explanation:

1. Provides connections to computers over a TCP/IP network: the standard protocol used for this is SSH/Telnet, through port number 22 and 23 respectively.

SSH is acronym for secure shell.

2. Sends e-mail over a TCP/IP network: SMTP using port number 25.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3. Translates URLs to IP address: DNS using port number 53.

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

4. Automates assignment of IP address on a network: DHCP using port number 67.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

5. Securely transports web pages over a TCP/IP network: HTTPS/SSL using port number 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

6. Transports files over a TCP/IP network: FTP using port number 20 or 21.

FTP is an acronym for file transfer protocol.

Explanation:

I guess there is no need of mine for giving ans now

as the above guy has explained everything

What menu allows you to add different features to your document?

Answers

Answer:

The Insert Menu. The insert menu is used to place various objects into your document, such as page numbers, pictures, symbols, comments and other objects. Commands include break, date and time, field, symbol, reference, web component, text box, file and hyperlink.

hope it helps ya mate!ت︎

In the space provided, explain the evolution of newspaper reporting, from the early 1900s to the Digital Age.

Answers

Circulation increased because more people became interested in the news. ... In that time, Yellow journalism led by William Hearst (New York Journal) and Joseph Pulitzer (New York World) managed the news in a sensationalistic way to attract more readers, and the circulation maintained its numbers.

The first newspaper,daily doings, was published by the ancient Romans in 59 BCE. In the new era, the newspaper is evolving continuously.

What is newspaper?

A newspaper is a bimonthly publication that contains written information on current events and is often typed in black ink on a white or gray backdrop.

The publication has gone through several changes during its lengthy and complicated existence.

Examining the history of newspapers can provide insight into how and why they have grown into the diverse media that they are today.

The first newspaper, daily doings, was published by the ancient Romans in 59 BCE, according to scholars. Despite the fact that no copies of this periodical have survived.

it is usually assumed that it chronicled events, assemblies, births, funerals, and daily gossip. These handwritten Avis, or gazettes, covered politics and military engagements.

Hence,the newspaper is evolved before 1900s and growing to a new digital Age.

To learn more about newspaper, refer:

https://brainly.com/question/21528399

#SPJ2

To figure out how to use her MacBook Pro graphics software to update designs originally created on a DEC10, Marianne needs to use a ______ language?

Answers

Answer:

Glue Language

Explanation:

I'm not 100% sure, but here is the definition.

Glue language- A programming language that can be used to provide interoperability between systems not originally intended to work together

write short cut of
fully justified​

Answers

Answer:

To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L

Which type of app is the best choice when it is critical to be able to use the device's features but performance is not critical? native web hybrid mobile

Answers

Answer:

Hybrid.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are; planning, analysis, design, development (coding), testing, implementation and execution, and maintenance.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model: it can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

II. An incremental model: it refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

III. A spiral model: it can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

Basically, softwares are categorized into three (3) main categories based on the development platform and these are;

a. Web application.

b. Native application.

c. Hybrid application.

A hybrid application is a type of software application that is designed based on the combination of the elements of both web applications and native applications.

Typically, a hybrid application is a web application that is developed in a native application shell, using a standardized web programming language such as CSS, JavaScript, and HTML.

Generally, a hybrid application avails a programmer the opportunity to write a code for a mobile application once while accommodating or being compatible with multiple app platforms such as Android, Windows, iOS, etc.

Hence, a hybrid application is the best choice of an application when it's critical for the end users to be able to use the features associated with a device such as a mobile phone but performance isn't critical.

Answer: Hybrid

Explanation: Hybrid apps are suited to situations where performance is not critical but using the device’s features are.

How would you keep executives informed about the progress of a project?
with a newsletter
via snail mail
by word of mouth
no need to, just keep it a secret

Answers

by word of mouth is how i would keep executives informed

Answer:

out of these options, only "by word of mouth" makes sense.

Explanation:

but in today's networking world there should be normally a tool, where the project team updates the information (ideally on a daily basis), and peers, managers, executives and other interested parties can see the updated summary information for their purpose.

but when and how should they be "triggered", if something happened that jeopardizes the business plan ?

immediately, in person. don't wait for any process and practice steps to deliver the information. valuable time would get lost. and I guess, that is what was meant by the question.

Ask how many apples the user wants. Ask how many people the user will share the apples with. Find out how many apples will remain if you share the apples equally. Hint: use modulus %.

Answers

Answer:

The program in Python is as follows:

apples = int(input("Apples: "))

people = int(input("People: "))

apples%=people

print("Remaining: ",apples)

Explanation:

This gets the number of apples

apples = int(input("Apples: "))

This gets the number of people to share the apple

people = int(input("People: "))

This calculates the remaining apple after sharing the apple evenly

apples%=people

This prints the calculated remainder

print("Remaining: ",apples)

Students who understand what the teacher is saying do not need to take notes.
Please select the best answer from the choices provided
T
F

Answers

Trueeeeeeeeeeeeeeeeee

Answer:

false

Explanation:

edge 2022

6x-7=2x +1 someone help​

Answers

6x-7=2x+1

-2x. -2x

4x-7=1

+7. +7

4x=8

÷4. ÷4

x=2

the answer is 2 !!!!!!

what is the purpose of a router

Answers

Answer:

below

Explanation:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

Answer:

to help connect a network to a device

Explanation:

for example a WiFi router is needed so that a specific device can be able to be connect with the WiFi network

The file format is used for graphic files.

Answers

Answer:

.GIF

Explanation:

GIF or Graphics Interchange Format files are widely used for web graphics, because they are limited to only 256 colors, can allow for transparency, and can be animated. GIF files are typically small is size and are very portable.

what is the software

Answers

Answer:

the programs and other operating information used by a computer.

Explanation:

Answer:

the programs and other operating information used by a computer

Create a paper of at least 1,800 words describing the situation you selected and explaining the logic that would support an array.

Answers

Answer:

I dont know about 1800 words but I sure can tell you abit about array

Explanation: Array in simple sense refers to a collection of similar data. It holds data which is homogeneous in nature, meaning they are all alike. The use of array provide a lot of advantages in the fields of computer programming. When you declare a variable for an array, you can store as much data as you wish in the same variable without having to declare many variables. A 2X2 dimensional array can also be used in programming which represents matrices as well. The search process in an array too is really convenient and time saving. Also in an array, accessing an element is very easy by using the index number.

que es la felicidad??​

Answers

Se feliz el amor es nada
Other Questions
1. Label all the following values using the box and whisker plot below: (1 point each)(a) Minimum:(b) Median (Q2):(c) lower quartile (Q1):(d) upper quartile (Q3):(e) maximum: Trevor is painting the front door of his house. The dimensions of the door are 812 feet by 212 feet by 3 inches. If he paints all of the surfaces with 2 coats of paint, how much total area will he paint? What was the date that the date of the second atomic bomb was dropped on Japan When did the U.S. join World War II?After the attack on Pearl HarborAfter the bombing of HiroshimaAfter Nazi Germany invaded PolandThe U.S. never fought in the war If the sperm (haploid cell of an organismcontains 12 chromosomes, what would be thenumber of chromosomes found in a regular body(diploid) cell? Which process emits carbon dioxide naturally into the atmosphere during the carbon cycle?A ) photosynthesisB ) Gas combustionC ) Cement productionD ) Cellular respiration 5. Solve. 2 Questions only 86 points c) 9.3 = 3n d) 2n - 2.5 = 5.5 Find the measure of angle 6. Find the common ratio for the geometric sequence-24, -12, -6 How was the creation of the State of Israel affected by the events of the Holocaust?Answer: The atrocities suffered by the Jews during the Holocaust encouraged the Allied powers to push for the formation of Israel. SOMONE PLEASE HELP ASAP!!!! PLS HELP QUICKLY!!! Choose the definition for the function.s-x+ 2 x 1a. y =x + 1 x 1c. y =1 x + 1 x < 11-X + 2 XS 1d. y ={-x+ 2 x 2 1x > 1x + 1 x < 1b. y = {x+1{** 2 *siEnter Petroleum is a mixture of hydrocarbons. It is separated into useful fractions by fractional distillation.Which property does fractional distillation rely on to separate petroleum? Which character is described in these lines?"Too loathsome and lasting. Not longer he tarried,But one night after continued his slaughterShameless and shocking, shrinking but littleFrom malice and murder; they mastered him fully."A: HigelacB: BeowulfC: GrendelD: Hrothgar The ordered pair (3, 2) is the solution of which systemof equations? Solve for xxx in the diagram below. Help me (giving brainliest) What is the answer to this x-7;x=23 3. How did the Ancient Greeks explain why crops do not grow in the winter?A. Winter is when Orpheus fails to retrieve his bride Eurydice from the Underworld.B. Winter is when Demeter, the goddess of the harvest, is longing for her daughter Persephone who is trapped in the Underworld with Hades.C. Winter is caused by Cronuss yearly plans to overthrow Zeus on Mt. Olympus.D. Winter is caused by Hercules efforts to capture Cerebus, the snarling three headed dog of Hades in the Underworld. Side 1: 3x2 - 2x - 1Side 2: 9x + 2x2 - 3The perimeter of the triangle is 5x3 + 4x2 - x - 3.Part B: What are the degree and classification of the expression obtained in Part A? (2 points)