Collaboration, listening, and negotiating are considered __________ skills.

interpersonal
mathematical
personal
verbal


VERBAL IS NOT THE ANSWER SOMEONE HELP

Answers

Answer 1

Answer:

interpersonal

Explanation:

Interpersonal skills are the types of skills that enhance the individuals' social interaction and communication means with others whereby there is the establishment of social rules and references.

It involves social communication activities such as collaboration, listening, and negotiation.

Hence, in this case, the correct answer is "INTERPERSONAL SKILLS.

Answer 2

Answer:

A. is correct

Explanation:


Related Questions

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right

just hellllllp me plzzzzzzzzzzzzz

Answers

it should increase the amount of thrust

Answer:

It is C.

Explanation:

Hope this helped have an amazing day!

Which job role requires you to create user guides for computer products and services?
A
creates users guides for computer products and services.
Reset
Next
Which job role requires you to create user guides for computer products and services

Answers

Answer: Technical writer

Explanation:

A technical writer is an individual who is responsible for the creation of technical documents such as user manuals, reference guides, instruction manuals, journal articles, etc.

Technical writers can work in software firms as they would be responsible for creating user guides for computer products and services.

Answer:

The answer for the blank box is :   technical writer

Explanation:

Hopefully this is right!

have a great day/eve!

Can someone help me get spotify premium

Answers

Answer:

Yes just go to spotify and pay for spotify premium.

Explanation:

Answer:

Buy it, go to the app store or google play and it will surely pop up like a sign saying premium.

Explanation:This is so hard :/

Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her favorite television shows. A student sets aside time to study every afternoon at his desk. O A student writes down some goals that she hopes to achieve in school. A student drafts a study schedule that includes breaks. A student uses her desk calendar to record the due dates for her homework assignments. O A student rushes through his homework while sending text messages to friends. 3). Intro​

Answers

Answer:

b,c,d, and e

Explanation:

Hope this helps

Answer:

BCDE

Explanation:

EDG 2021

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

str = input("Enter a number: ")

sum = 0

for c in str:

   sum = sum + int(c)

print("Sample input - {}".format(str))

print("Sum of digits - {}".format(sum))

print("Number of digits - {}".format(len(str)))

Explanation:

That's python. Was that what you were looking for?

Answer Using Java :-

import java.util.*;

public class Digit

{

public static void main(String args[ ] )

{

Scanner in=new Scanner (System.in)

System.out.print("Enter a number: ");

int n = in.nextInt();

int sum = 0, count = 0;

while (n!=0)

{

int d = n % 10;

sum + = d;

count++;

n /= 10;

}

System.out.println("Sum of digits=" +sum);

System.out.println("Number of digits=" +count);

}

}

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

Communication of the binary data via the voltage level for each time interval.
a
voice assistant
b
machine language
c
voltage
d
digital signal

Answers

Answer:

D

Explanation:

Answer:

D. Digital signal

Explanation:

Edge 2022

Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between 1 and 20. Then I, the computer will try to my best to guess the number. Is it a 18? (y/n) n Higher or Lower (h/l) l Is it a 5?(y/n) n Higher or Lower (h/l) h Is it a 10? (y/n) y I got tour number of 10 in 3 guesses.

Answers

Answer:

This question is answered using C++ programming language.

#include<iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int num, computerguess;

   char response, hl;

   cout<<"Choose your number: ";

   cin>>num;

   srand((unsigned) time(0));

   int high = 20;    int low = 1;    int guess = 0;

   computerguess = low + rand() % high;

   cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   while(response == 'n'){

       cout<<"Higher or Lower? h/l: ";

       cin>>hl;

       if(hl == 'h'){            low = computerguess+1; }

       else{   high = computerguess-1; }

       guess++;

       computerguess = low + rand() % high;

       cout<<"Is it "<<computerguess<<" ?y/n: ";

   cin>>response;

   }

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

   return 0;

}

Explanation:

This declares num (user input) and computerguess as integer

   int num, computerguess;

This declares response (which could be yes (y) or no (n) and hl (which represents high or low) as char

   char response, hl;

This prompts user for input

   cout<<"Choose your number: ";

This gets user input

   cin>>num;

This allows the computer be able to generate different random numbers at different intervals

   srand((unsigned) time(0));

This declares and initializes the range (high and low) to 20 and 1 respectively. Also, the initial number of guess is declared and initialized to 0

   int high = 20;    int low = 1;    int guess = 0;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;

The following iteration is repeated until the computer guess is right

   while(response == 'n'){

This asks if computer guess is high or low

       cout<<"Higher or Lower? h/l: ";

This gets user response (h or l)

       cin>>hl;

If the response is higher, this line gets the lower interval of the range

       if(hl == 'h'){            low = computerguess+1; }

If the response is lower, this line gets the upper interval of the range

       else{   high = computerguess-1; }

This increments the number of guess by 1

       guess++;

Here, the computer take a guess

   computerguess = low + rand() % high;

This asks if the computer guess is right

   cout<<"Is it "<<computerguess<<" ?y/n: ";

This gets user response (y or n)

   cin>>response;    }

This prints the statistics of the guess

   cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

What happens when a sender configures the sensitivity setting of a message to Private?

The security settings of the message are raised.
The recipient must send a confirmation of receipt.
The recipient is notified that the message is private.
The recipient receives a key code to unlock the message.

Answers

Answer:

The recipient is notified that the message is private.

Explanation:

In Microsoft Outlook: This is application software that is used as an electronic messaging platform otherwise known as email.

When a sender configures the sensitivity setting of a message to Private "The recipient is notified that the message is private."

Answer:

Look at the attached file

Explanation:

I'm 100% correct as you can see

The First Amendment of the Constitution is one of the most important parts of the Bill of Rights. What specific rights does this amendment guarantee to every American citizen?

Answers

Answer:

The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government

Explanation:

if this answer is correct make me as brainlelist

Answer:

its guarantees the freedom of speech, religion, and the freedom of the press.

Explanation:

Select the correct answer
Which filter enhances the color contrast around the edges of an image?

A. Texture filters

B.Sharpen filters

C.Blur filters

D.Noise filters

Answers

Answer: C. Blur filters

Explanation:

The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.

So, the color answer C. Blur filters

Answer:

B, Sharpen Filters

Explanation:

i got it right lol

Food deliveries should be scheduled _____.

Answers

Answer:

1-11pm

Explanation:

Answer:

at less busy times so that staff has time to properly inspect food

Explanation:

What will you see on the next line?

>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)

1

7

3

2

Answers

Answer:

its 3, just did it on edg 2020

Explanation:

sdfdsfdsfdsfsdfsdf vote me brainliest!

The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.

What is an array?

A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.

The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".

So, the next line will be:

>>> aList = [12, 3, 5, 7, 7]

>>> aList.index(7)

3

Therefore, the correct option is c. 3.

To learn more about array, refer to the link below:

brainly.com/question/14915529

#SPJ2

what is bit and byte in computer​

Answers

A bit is the smallest unit of information a byte is to see how many bits need to be represented (letters/characters)

Hope this helps

help pleaseee!!!!!!! will give brainliest !!!!!
How do you increase the number of CPUs in a virtual machine in order to optimize it?

Answers

Answer:

Not sure if this will help

Explanation:

increase the number of motherboards, and install compatible CPUs on each motherboard

heeeeeeeeeeeelp idek plz help

Answers

Answer:

b

Explanation:

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills

Answers

Answer:

Bank Rate skills

Explanation:

because it is i believe

Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​

Answers

Answer:

Umm was there supposed to be a picture????

Explanation:

Hope you have a wonderful Christmas Eve time with your family!!❄️

Eight bits are called a byte. One byte character sets can contain 256 characters. The current standard, though, is Unicode, which uses two bytes to represent all characters in all writing systems in the world in a single set.

What is memory space?

Memory refers to the location of short-term data, while storage refers to the location of data stored on a long-term basis. Memory is the power of the brain to recall experiences or information.

Memory is most often referred to as the primary storage on a computer, such as RAM. Memory is also where information is processed. It enables users to access data that is stored for a short time.

Learn more about Memory here,

https://brainly.com/question/23423029

#SPJ2

What is the other name of the horizontal column graph?
graph is also known as the horlzontal column graph.

Answers

Answer:

Side Graph mabye?

Explanation:

Answer:

A bar graph.

Explanation:

A bar graph is also known as the horizontal column graph.

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

HELP PLZZ Which statement is true? Select 3 options.


A. A function must have a return value.

B. A function can use variables as parameters.

C. The definition of a function must come before where the function is used.

D. The definition of a function can come before or after it is used.

E. A function can have more than one parameter.

Answers

Answer:

B. C. E.

hope this helps :D

Answer:

The definition of a function must come before where the function is used.

A function can have more than one parameter.

A function can use variables as parameters.

Explanation:

heeeeelp
and thank you

Answers

Answer:

2375 calories

Explanation:

125% of 1900=2375 calories

Answer:

2375 calories

Explanation:

it's asking for 125% which is the same as 100% + 25%

100% is 1900

25% of 1900 is 475

1900 + 475 is 2375

choose the type of error described. can you help me bc i don’t know??

Answers

Answer:

logic error occurs when the result is wrong...

syntax error occurs when you use the wrong punctuation...

runtime error occurs when the program starts running...

Answer:

Logic error: When the computer outputs an undesirable value due to the wrong use of operations.

Syntax error: Occurs when syntax is not used correctly in code.

Zero division error: Occurs when a value is divided by zero.

Hope this helps :)

Major innovations made from the establishment of abucus to the 5th computer generation

Answers

Answer:

Cogs and Calculators

It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."

Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).

Explanation:

What is Microsoft Windows?

Answers

Microsoft Windows is, computer operating system (OS) developed by Microsoft Corporation to run personal computers (PCs).

HELP ME!!! I WILL GIVE BRAINLY THINGY!!!

What does the code if (num2==50){ do?

Answers

Answer:

What subject is this?

Explanation:

is this math ?????????????????????

Wearables, video playback and tracking devices can help athletes because

Answers

Answer: rap accusations

Explanation:

Other Questions
How many terms are in 12x - 3 = 18 11. Write an equation in slope-intercept form that passes through (2,3) and 1 (1,5). * From the twenty-fifth century BCE, pharaohs' tombs were located inside grand pyramids. The pyramids served as giant grave markers; however, they also served as treasure markers for grave robbers. These wicked people would strip the tomb bare of valuables. Then they would sell the stolen items for a large amount of money. Stealing from the dead was bad enough, but for the ancient egyptians, the act also threatened the pharaoh's afterlife. The answer is ( B grave robbers were unconcerned about the pharaoh's afterlife), tell me why B is correct? Due to the terms of the treaties they signed after the Civil War, what happened to the slaves owned by American Indian tribes?A.They were granted land in western Arkansas for settlement.B.They became citizens of the American Indian tribes.C.They could not be granted emancipation due to tribal law.D.They were paid a stipend by the American Indian nations. Plezzzzzwzzzzzzzz help 1. What are at least two key distinctions between a developed and a developing nation that thetable suggests? What is a key distinction between the United States and both other nations? (2points) A fraction whose value is the same as 3/4 is in the grid below, the vertices of triangle ABC are A(-1,9), B(7,2), and C(-1,2). Which is closest to the area of triangle ABC? ASAP Eight friends go to the movies. The price for each ticket is$7.99. One person thinks the total for all eight people willbe around $50.00.Is this a reasonable estimate? Why?OA. Yes, a reasonable estimate is around 5- $10 = $50.B. No, a reasonable estimate is around 5 $8 = $40.C. No, a reasonable estimate is around 8 $8 = $64.OD. No, a reasonable estimate is around 8-$9 = $72. The sum of a number and 16 times it's reciprocal is 10. Find the numbers How did Theodore Roosevelt change the role of the president in the federal government? Jonathan is building a fence for his chickens. The length of a rectangle isequal to triple the width. The perimeter(P=2L+2W) is 72 centimeters. Whatis the width of the fence? What is the distance between point A and point B? Round to nearest tenth. URGENT!!! PLEASE ANSWER!!!! what are some mythical creatures boys said that they would like to own today? Based on table N of the reference tables what is the number of hours required for 42k (potassium -42) to undergo three half-life periods Factor with the distributive property (no variables)90+27= Helppppppppppppppppppppppppppppppppppppppp Pleaseeeeeeeeeeeeeeeee Financial well-being refers to a person that (check all that apply) * many factors affect human health. which term BEST describes diet and exercise for MOST adults?a. lifestyle choiceb. environmental factorc. genetic predispositiond. medically prescribed behavior If 50. mL of 1.0 M NaOH is diluted with distilled water to a volume of 2.0 L, the concentration of the resulting solution is A0.025 M B 0.050 M C 0.10 M D 0.50 M E 1.0 M M