1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
6

What is working with others to find a mutually agreeable outcome?

Computers and Technology
1 answer:
Arturiano [62]3 years ago
3 0

Answer:

its B. negotiation

Explanation:

1. I got it right on the exam :)

2. negotiation resolves in problem solving. you work together with others to solve problems, together which is negotiating/ talking things through to figure out an answer/ outcome.

Hope this helps! :))

Have an awesome day!!

You might be interested in
1.How can we be a responsible online user???​
PSYCHO15rus [73]

Answer:

Be respectful – and expect respect.

Protect your reputation.

Protect your privacy.

Watch your tone.

Be sceptical.

3 0
3 years ago
Read 2 more answers
Which of the strategies below are likely to increase audience attention?
lbvjy [14]

Answer:

Vary the use of transitions for each slide

Explanation:

6 0
3 years ago
The actual method of key generation depends on the details of the authentication protocol used.
yan [13]

Answer:

True is the correct answer .

Explanation:

Key generation is the method that are used for the security purpose .The key generation is used in the encryption and decryption process that are totally depends type of the authentication  protocol.We can used the particular program to produce the key .

The key generation is used in the cryptography. We also symmetric and asymmetric key concept for the key generation .Authentication and Key Agreement is one of the authentication  protocol that are mainly used in the 3 g network that are depend on the key generation.

Therefore the given statement is true .

4 0
4 years ago
What is the difference between master file and transaction file​
klio [65]

Answer:

master file contains data types while transaction file is used to record Master file

Explanation:

hope it helps

3 0
3 years ago
Design and code a Swing GUI to translate text that is input in english into pig latin. You can assume that the sentence contains
Whitepunk [10]

Answer:

Code given below

Explanation:

import javax.swing.*;

import java.util.*;

import java.awt.*;

import java.awt.event.*;

public class PigLatin extends JFrame

{

private JLabel prompt;

private JTextField input;

private JTextArea output;

private int count;

public PigLatin()

{

super( "Pig Latin Generator" );

prompt = new JLabel( "Enter English phrase:" );

input = new JTextField( 30 );

input.addActionListener(

new ActionListener() {

public void actionPerformed( ActionEvent e )

{

String s = e.getActionCommand().toString();

StringTokenizer tokens = new StringTokenizer( s );

count = tokens.countTokens();

while ( tokens.hasMoreTokens() ) {

count--;

printLatinWord( tokens.nextToken() );

}

}

}

);

output = new JTextArea( 10, 30 );

output.setEditable( false );

Container c = getContentPane();

c.setLayout( new FlowLayout() );

c.add( prompt );

c.add( input );

c.add( output );

setSize( 500, 150 );

show();

}

private void printLatinWord( String token )

{

char letters[] = token.toCharArray();

StringBuffer schweinLatein = new StringBuffer();

schweinLatein.append( letters, 1, letters.length - 1 ) ;

schweinLatein.append( Character.toLowerCase( letters[ 0 ] ) );

schweinLatein.append( "ay" );

output.append( schweinLatein.toString() + " " );

if ( count == 0 )

output.append( "\n" );

}

public static void main( String args[] )

{

PigLatin app = new PigLatin();

app.addWindowListener(

new WindowAdapter() {

public void windowClosing( WindowEvent e )

{

System.exit( 0 );

}

}

);

}

}

5 0
4 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • A cell reference is also called a cell _______.
    14·1 answer
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • How to construct a 112.5 degree angle?
    15·1 answer
  • The _________ indicates the number of elements, or values, an array can hold
    14·1 answer
  • Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th
    9·2 answers
  • you just bought a new hard drive for your computer .you plan to use this as a secondary hard drive to store alll your files. wha
    15·1 answer
  • Which types of networks cover large geographical areas such as several states? PAN
    9·1 answer
  • Photographing during the midday can produce which of the following?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!