Answer:
interpersonal
Explanation:
Interpersonal skills are the types of skills that enhance the individuals' social interaction and communication means with others whereby there is the establishment of social rules and references.
It involves social communication activities such as collaboration, listening, and negotiation.
Hence, in this case, the correct answer is "INTERPERSONAL SKILLS.
Answer:
A. is correct
Explanation:
What is the other name of the horizontal column graph?
graph is also known as the horlzontal column graph.
Answer:
Side Graph mabye?
Explanation:
Answer:
A bar graph.
Explanation:
A bar graph is also known as the horizontal column graph.
PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills
Answer:
Bank Rate skills
Explanation:
because it is i believe
What will you see on the next line?
>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)
1
7
3
2
Answer:
its 3, just did it on edg 2020
Explanation:
sdfdsfdsfdsfsdfsdf vote me brainliest!
The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.
What is an array?A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.
The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".
So, the next line will be:
>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)
3
Therefore, the correct option is c. 3.
To learn more about array, refer to the link below:
brainly.com/question/14915529
#SPJ2
What happens when a sender configures the sensitivity setting of a message to Private?
The security settings of the message are raised.
The recipient must send a confirmation of receipt.
The recipient is notified that the message is private.
The recipient receives a key code to unlock the message.
Answer:
The recipient is notified that the message is private.
Explanation:
In Microsoft Outlook: This is application software that is used as an electronic messaging platform otherwise known as email.
When a sender configures the sensitivity setting of a message to Private "The recipient is notified that the message is private."
Answer:
Look at the attached file
Explanation:
I'm 100% correct as you can see
help pleaseee!!!!!!! will give brainliest !!!!!
How do you increase the number of CPUs in a virtual machine in order to optimize it?
Answer:
Not sure if this will help
Explanation:
increase the number of motherboards, and install compatible CPUs on each motherboard
The First Amendment of the Constitution is one of the most important parts of the Bill of Rights. What specific rights does this amendment guarantee to every American citizen?
Answer:
The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government
Explanation:
if this answer is correct make me as brainlelist
Answer:
its guarantees the freedom of speech, religion, and the freedom of the press.
Explanation:
Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro
Answer:
b,c,d, and e
Explanation:
Hope this helps
Answer:
BCDE
Explanation:
EDG 2021
HELP ME!!! I WILL GIVE BRAINLY THINGY!!!
What does the code if (num2==50){ do?
Answer:
What subject is this?
Explanation:
PLEASE HURRY!!
Look at the image below!
Can someone help me get spotify premium
Answer:
Yes just go to spotify and pay for spotify premium.
Explanation:
Answer:
Buy it, go to the app store or google play and it will surely pop up like a sign saying premium.
Explanation:This is so hard :/
what is bit and byte in computer
I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.
My code:
b = float(input("Enter Temperature: "))
Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line
Answer:
The error is because you wrapped the input in float. First record the input and then modify it.
Explanation:
b = input("enter temp:")
b = float(b)
just hellllllp me plzzzzzzzzzzzzz
it should increase the amount of thrust
Answer:
It is C.
Explanation:
Hope this helped have an amazing day!
heeeeeeeeeeeelp idek plz help
Answer:
b
Explanation:
HELP PLZZ Which statement is true? Select 3 options.
A. A function must have a return value.
B. A function can use variables as parameters.
C. The definition of a function must come before where the function is used.
D. The definition of a function can come before or after it is used.
E. A function can have more than one parameter.
Answer:
B. C. E.
hope this helps :D
Answer:
The definition of a function must come before where the function is used.
A function can have more than one parameter.
A function can use variables as parameters.
Explanation:
Fill in the blanks : To store 3 character a computer occupies...................bytes memory space
Answer:
Umm was there supposed to be a picture????
Explanation:
Hope you have a wonderful Christmas Eve time with your family!!❄️
Eight bits are called a byte. One byte character sets can contain 256 characters. The current standard, though, is Unicode, which uses two bytes to represent all characters in all writing systems in the world in a single set.
What is memory space?Memory refers to the location of short-term data, while storage refers to the location of data stored on a long-term basis. Memory is the power of the brain to recall experiences or information.
Memory is most often referred to as the primary storage on a computer, such as RAM. Memory is also where information is processed. It enables users to access data that is stored for a short time.
Learn more about Memory here,
https://brainly.com/question/23423029
#SPJ2
Match the terms with their definitions
Answer:
Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.
Hope this helps! :)
Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between 1 and 20. Then I, the computer will try to my best to guess the number. Is it a 18? (y/n) n Higher or Lower (h/l) l Is it a 5?(y/n) n Higher or Lower (h/l) h Is it a 10? (y/n) y I got tour number of 10 in 3 guesses.
Answer:
This question is answered using C++ programming language.
#include<iostream>
#include <cstdlib>
#include <ctime>
using namespace std;
int main(){
int num, computerguess;
char response, hl;
cout<<"Choose your number: ";
cin>>num;
srand((unsigned) time(0));
int high = 20; int low = 1; int guess = 0;
computerguess = low + rand() % high;
cout<<"Is it "<<computerguess<<" ?y/n: ";
cin>>response;
while(response == 'n'){
cout<<"Higher or Lower? h/l: ";
cin>>hl;
if(hl == 'h'){ low = computerguess+1; }
else{ high = computerguess-1; }
guess++;
computerguess = low + rand() % high;
cout<<"Is it "<<computerguess<<" ?y/n: ";
cin>>response;
}
cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";
return 0;
}
Explanation:
This declares num (user input) and computerguess as integer
int num, computerguess;
This declares response (which could be yes (y) or no (n) and hl (which represents high or low) as char
char response, hl;
This prompts user for input
cout<<"Choose your number: ";
This gets user input
cin>>num;
This allows the computer be able to generate different random numbers at different intervals
srand((unsigned) time(0));
This declares and initializes the range (high and low) to 20 and 1 respectively. Also, the initial number of guess is declared and initialized to 0
int high = 20; int low = 1; int guess = 0;
Here, the computer take a guess
computerguess = low + rand() % high;
This asks if the computer guess is right
cout<<"Is it "<<computerguess<<" ?y/n: ";
This gets user response (y or n)
cin>>response;
The following iteration is repeated until the computer guess is right
while(response == 'n'){
This asks if computer guess is high or low
cout<<"Higher or Lower? h/l: ";
This gets user response (h or l)
cin>>hl;
If the response is higher, this line gets the lower interval of the range
if(hl == 'h'){ low = computerguess+1; }
If the response is lower, this line gets the upper interval of the range
else{ high = computerguess-1; }
This increments the number of guess by 1
guess++;
Here, the computer take a guess
computerguess = low + rand() % high;
This asks if the computer guess is right
cout<<"Is it "<<computerguess<<" ?y/n: ";
This gets user response (y or n)
cin>>response; }
This prints the statistics of the guess
cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";
Communication of the binary data via the voltage level for each time interval.
a
voice assistant
b
machine language
c
voltage
d
digital signal
Answer:
D
Explanation:
Answer:
D. Digital signal
Explanation:
Edge 2022
Which job role requires you to create user guides for computer products and services?
A
creates users guides for computer products and services.
Reset
Next
Which job role requires you to create user guides for computer products and services
Answer: Technical writer
Explanation:
A technical writer is an individual who is responsible for the creation of technical documents such as user manuals, reference guides, instruction manuals, journal articles, etc.
Technical writers can work in software firms as they would be responsible for creating user guides for computer products and services.
Answer:
The answer for the blank box is : technical writer
Explanation:
Hopefully this is right!
have a great day/eve!
Select the correct answer
Which filter enhances the color contrast around the edges of an image?
A. Texture filters
B.Sharpen filters
C.Blur filters
D.Noise filters
Answer: C. Blur filters
Explanation:
The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.
So, the color answer C. Blur filters
Answer:
B, Sharpen Filters
Explanation:
i got it right lol
plzz help me with this question.........
Write a program to input a number find the sum of digits and the number of digits. Display the output
sample input - 7359
sample digits - 24
number of digits - 4
Answer:
str = input("Enter a number: ")
sum = 0
for c in str:
sum = sum + int(c)
print("Sample input - {}".format(str))
print("Sum of digits - {}".format(sum))
print("Number of digits - {}".format(len(str)))
Explanation:
That's python. Was that what you were looking for?
import java.util.*;
public class Digit
{
public static void main(String args[ ] )
{
Scanner in=new Scanner (System.in)
System.out.print("Enter a number: ");
int n = in.nextInt();
int sum = 0, count = 0;
while (n!=0)
{
int d = n % 10;
sum + = d;
count++;
n /= 10;
}
System.out.println("Sum of digits=" +sum);
System.out.println("Number of digits=" +count);
}
}
What are specific and relevant terms that will help you locate information using an internet search engine?
A: Keywords
B: Search Words
C: Smart Words
D: Unusual Words
please help me!!
Answer:
keyword
Explanation:
i got it right
heeeeelp
and thank you
Answer:
2375 calories
Explanation:
125% of 1900=2375 calories
Answer:
2375 calories
Explanation:
it's asking for 125% which is the same as 100% + 25%
100% is 1900
25% of 1900 is 475
1900 + 475 is 2375
Wearables, video playback and tracking devices can help athletes because
Answer: rap accusations
Explanation:
choose the type of error described. can you help me bc i don’t know??
Answer:
logic error occurs when the result is wrong...
syntax error occurs when you use the wrong punctuation...
runtime error occurs when the program starts running...
Answer:
Logic error: When the computer outputs an undesirable value due to the wrong use of operations.
Syntax error: Occurs when syntax is not used correctly in code.
Zero division error: Occurs when a value is divided by zero.
Hope this helps :)
Food deliveries should be scheduled _____.
Answer:
1-11pm
Explanation:
Answer:
at less busy times so that staff has time to properly inspect food
Explanation:
What is Microsoft Windows?
What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network
Answer: vulnerability scanners
Explanation:
The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.
Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.
Major innovations made from the establishment of abucus to the 5th computer generation
Answer:
Cogs and Calculators
It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."
Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).
Explanation: