1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
4 years ago
8

Monica and Tyrell agree upon the main problem they are facing as a team. What is the next step to finding a win-win solution? Ag

ree upon the main problem Brainstorm possible solutions Identify the problem Negotiate a solution
Computers and Technology
2 answers:
Pani-rosa [81]4 years ago
7 0
Brainstorm possible solutions 
andrey2020 [161]4 years ago
5 0

Answer:

Monica and Tyrell should Brainstorm possible solutions

Explanation:

since Monica and Tyrell have agreed upon the main problem facing them as a team the best next move is to Brainstorm possible solutions.

Agree upon the main problem: this step have already been taken by Monica and Tyrell after they agreed upon the problem facing them as a team

Brainstorm possible solution is the ultimate next step/move they should take

identify the problem : this was the first step taken

Negotiate a solution: this is the next step after Brainstorming and getting series of solutions they will have to negotiate on the best solution to implement

You might be interested in
A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
Varvara68 [4.7K]
The answer is C) Availability.

Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.

Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.

C) Availability is the best answer because it is part of the CIA triad.

Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
5 0
3 years ago
Read 2 more answers
Which feature of a blog allows an author to interact and get feedback from his or her readers? link pingback commenting TweetMem
poizon [28]
Commenting. When someone comments of a blog the blog's writer can comment back, to answer questions, etc.
6 0
3 years ago
Which of the following cannot be created using Word software?
Arturiano [62]
3-database of new clients
7 0
4 years ago
It's possible to __________ out of a loop if the user has entered an incorrect value that would cause an error or a problem with
Stella [2.4K]

Answer:

The answer is Break

<u>Explanation:</u>

When break statement is occurred then, it immediately exits from the loop and executed the statement after the loop without raising any kind of error.

<u>The situation after entering of a value by a user </u>

  • If the user entered incorrect value then it will exit from the loop.
  • If the user entered correct input value, then it will run the loop for the further values.

4 0
3 years ago
What does the term hardware refer to?
Jobisdone [24]

Answer:

The physical components that a computer is made of

Explanation:

as u can see these components and u can repaire these components if they got damaged

6 0
3 years ago
Other questions:
  • Where are Micro USB connectors used the most?
    11·2 answers
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
    13·1 answer
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • Discuss the differences between a quantitative and qualitative risk analysis. Please write two paragraphs.
    8·1 answer
  • Where do animators work?
    8·1 answer
  • What is microsoft excel​
    9·2 answers
  • Java question
    15·1 answer
  • Database queries is an example of
    14·1 answer
  • Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!