Communicators do not have an ethical responsibility to share information that other people require to make informed decisions.True/False


Answer 1




A communicator is an individual who is obligated to clearly present information to an audience. There are two set of quality a communicator must have to win the trust of the audience, they are, the communicator must be prepared and ethical.

A prepared communicator must learn to organise his oral or written skills, must articulate very word and meaning of expression (clear) and a information must be brief and meaningful.

An ethical communicator must be impartial, trustworthy, respectful and must practice the golden rule. The information they give should help in making proper decisions to situations.

Related Questions

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?
For selection purposes, it is critical that application items have a proven relationship between a selection device and some relevant criterion. This is called
what would be the address of the cell, which is intersect of the second row and third column in a worksheet
Population Growth The world population reached 7 billion people on October 21, 2011, and was growing at the rate of 1.1% each year. Assuming that the population continues to grow at the same rate, approximately when will the population reach 8 billion? using python
Write an Enlistee class that keeps data attributes for the following pieces of information: • Enlistee name • Enlistee number Next, write a class named Private that is a subclass of the Enlistee class. The Private class should keep data attributes for the following information: • Platoon number (an integer, such as 1, 2, or 3) • Years of service (also an integer)

g A peer-to-peer PLC network: has no master PLC. uses the token passing access control scheme. each device is identified by an address. all of these.



All of these


A peer-to-peer network is a type of computer network that computer devices directly to each other, sharing information and other resources on the network.

It does not have a centralized database, there are no master or slave as each device in the network is a master on its own, and the devices all have unique addresses assigned statically for identification.

No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have visited. Why might this be happening, and what is the first step you will take to correct this problem? Phishing Scam You just received an email message from someone requesting personal identification information. Believing the message was legitimate, you provided the requested information to the original sender. You now realize, however, that you might have fallen victim to a phishing scam. What are your next steps? Suspicious File Attachment You receive an email message that appears to be from someone you know. When you try to open the attachment, nothing happens. You attempt to open the attachment two more times without any success. Several minutes later your computer is running slower and you are having trouble running apps. What might be wrong? Antivirus Software Outdated After starting your computer and signing in to the operating system, a message is displayed stating that your virus definitions are out of date and need to be updated. What are your next steps? Laptop's Physical Security You plan to start taking your laptop to school so that you can record notes in class. You want to make sure, however, that your computer is safe if you ever step away from it for a brief period of time. What steps can you take to ensure the physical security of your laptop?


  • The steps a person can take to ensure the physical security of your laptop is to;
  • Always use a firewall.
  • Make sure your software up to date.
  • Use antivirus software

How can a person  physically secure their laptop?

A lot of laptops and desktop computers are known to have built-in slots that can connect with a cable lock.  A person can keep their Laptops from getting Lost or stolen by;

  • Keeping it locked.
  • Keeping it off the floor, etc.

learn more about laptop  from

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.

The section on the Publisher screen that allows you to quickly move from one page another in a publication is the _____. View tabPage pane

Page Design tab

Zoom bar



Page pane


This pane is present under the navigation pane, it allow to hop easily from one page to other.  Moreover pages can be added using Add Page button.

Page pane makes the view and navigation from on page to another easier and quicker.

1) The program reads an integer, that must be changed to read a floating point. 2) You will need to move that number into a floating point register and then that number must be copied into an integer register. 3) You will need to extract the exponent from the integer register and stored in another register. 4) You will need to insert the Implied b



1. Get the number

2. Declare a variable to store the sum and set it to 0

3. Repeat the next two steps till the number is not 0

4. Get the rightmost digit of the number with help of remainder ‘%’ operator by dividing it with 10 and add it to sum.

5. Divide the number by 10 with help of ‘/’ operator

6. Print or return the sum

# include<iostream>

using namespace std;

/* Function to get sum of digits */

class gfg



   int getSum(float n)


   float sum = 0 ;

   while (n != 0)


    sum = sum + n % 10;

    n = n/10;


return sum;



//driver code

int main()


gfg g;

float n = 687;  

cout<< g.getSum(n);

return 0;



/ Looks up author of selected booksimport java.util.*;
class DebugNine1
public static void main(String[] args)
Scanner input = new Scanner(;
String[][] books = new String[6][2];
books[0][0] = "Ulysses";
books[0][1] = "James Joyce";
books[1][0] = "Lolita"
books[1][1] = "Vladimir Nabokov";
books[2][1] = "Huckleberry Finn";
books[2][1] = "Mark Twain";
books[3][0] = "Great Gatsby";
books[3][2] = "F. Scott Fitzgerald";
books[4][0] = "1984";
books[4][1] = "George Orwell";
books[5][5] = "Sound and the Fury";
books[5][1] = "William Faulkner";
String entry,
message ="Enter the first three characters of a book title omitting \"A\" or \"The\" ";
int num, x;
boolean isFound = true;
entry =;
shortEntry = entry.substring(0,3);
for(x = 0; x < books.length; ++x)
isFound = true;
System.out.println(books[x][x] + " was written by " + books[x][1]);
x = books.length;
System.out.println("Sorry - no such book in our database);



What's the question?


software that interprets commands from the keyboard and mouse is also known as the? A. desktop B. Operating system C. operating disk D. hard drive