1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
2 years ago
5

What is working with others to find a mutually agreeable outcome?

Computers and Technology
1 answer:
eduard2 years ago
5 0

Negotiation is one possible answer to this question, I believe, though there are other words which mean similar things that could also suffice. For example, compromise is very similar in meaning, though this specifically means each person is conceding something to find an agreement.

You might be interested in
What does ""fair use"" mean regarding copyrighted works?
Nady [450]

In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Fair Use of copying of copyrighted material can only be used in a short and revelatory us, example to criticize, or caricature of a copyrighted work. It is often known to be a legal defense that protects individuals of copyrighted material from copyright infringement.

  • Fair use allows a person/people to use a copyrighted work without acknowledgement or permission of copyright owner and it can be used  to criticize, comment, news reporting, teaching, research etc. It is not seen as infringement under the law.

Conclusively, we can say that In regards copyrighted works, fair use is simply known as legal dogma that allows the right to free expression by allowing the unlicensed use of copyright-protected works by individuals as regards to some certain situations.

Learn more from:

brainly.com/question/1534807

5 0
1 year ago
Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out th
attashe74 [19]

Answer:

import datetime

user = input("Enter date in yyyy,m,d: ").split(",")

int_date = tuple([int(x) for x in user])

year, month, day =int_date

mydate = datetime.datetime(year, month, day)

print(mydate)

x = mydate.strftime("%B %d, %Y was a %A")

print(x)

Explanation:

The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.

5 0
2 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
How do lung and heart work together
Vinil7 [7]
Heart is attached to the lungs by the pulmonary artery and vein the artery carries deoxygenated blood to the pulmonary circuit (lungs) the lungs have a gas exchange and the deoxygenated blood goes back to the heart via the pulmonary vein.<span />
8 0
3 years ago
Other questions:
  • President Roosevelt's Fireside Chats were:
    12·2 answers
  • Which of the following sentences uses the correct verb tense?
    8·2 answers
  • Briefly explain the cooling mechanism implemented in a fanless laptop
    15·1 answer
  • To easily add an organizational chart to a document, users should select _____. SmartArt Text Boxes Shapes Clip Art
    8·2 answers
  • What identifies available computers through the internet?
    14·1 answer
  • What happens as the key length increases in an encryption application?
    8·1 answer
  • How do you find specific words on a web page ...?? I know theres a shortcut for highlighting a specific word on a webpage on fir
    15·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Write a java code to print Multiplication Table Till 20
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!