1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
4 years ago
7

Collaboration, listening, and negotiating are considered __________ skills.

Computers and Technology
2 answers:
satela [25.4K]4 years ago
8 0

Answer:

Its not verbal, I got that wrong on the test. I believe it is personal because that deals with  the ability to work with others to get job done.

Explanation:

kupik [55]4 years ago
4 0

They are considered to be verbal skills.

You might be interested in
Which one of the following features can control left and right indents using markers?
abruzzese [7]
D) The styles pane.

Word normally applies the chosen formatting commands when a style is applied. To control the left or the right indent (distance of a paragraph from the left or right of a margin) in a document using markers, one has to use the styles pane.






4 0
3 years ago
Read 2 more answers
You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
erma4kov [3.2K]

Answer:

Port authentication

Explanation:

A port authentication enables the configuration of a parameters of the ports to connect to the network. When the ports are in the Force Authorized state, only some configuration changes are possible.

In the context, I want to configure the port authentication so as to make sure that the people who visited the building and wants to plug in the switch should connect to the network and not the free networks. An d also the employees who plug in the same jack should also connect to the same network.

8 0
3 years ago
Internet speed test, why does it take some time to get maximum speed
Brut [27]
Because speed test is measuring your real-time network connection, Tests taken within a few minutes of each other might vary a little based on network congestion and available bandwidth.
4 0
3 years ago
Write a main program that prompts users for 5 integers. Use two separate functions to return (NOT print) the highest and lowest
Soloha48 [4]

Answer:

import java.util.Arrays;

import java.util.Scanner;

public class LatinHire {

   public static void main(String[] args) {

       Scanner in = new Scanner (System.in);

       System.out.println("Enter Five integers");

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int num3 = in.nextInt();

       int num4 = in.nextInt();

       int num5 = in.nextInt();

       int [] intArray = {num1,num2,num3,num4,num5};

       System.out.println(Arrays.toString(intArray));

       System.out.println("The Maximum is "+returnMax(intArray));

       System.out.println("The Minimum is "+returnMin(intArray));

   }

   public static int returnMax(int []array){

       int max = array[0];

       for(int i=0; i<array.length; i++){

           if(max<array[i]){

               max= array[i];

           }

       }

       return max;

   }

   public static int returnMin(int []array){

       int min = array[0];

       for(int i=0; i<array.length; i++){

           if(min>array[i]){

               min= array[i];

           }

       }

       return min;

   }

}

Explanation:

  1. This is implemented in Java Programming Language
  2. Two Methods are created returnMax(Returns the Maximum Value of the five numbers) and returnMin(Returns the minimum of the five numbers)
  3. In the Main method, the user is prompted to enter five numbers
  4. The five numbers are saved into an array of integers
  5. The returnMax and returnMin methods are called and passed the array as parameter.
  6. The entire array of numbers inputted by the user as well the Max and Min are printed

6 0
3 years ago
"Which of the following will help protect against a brute force attack?
Effectus [21]

Answer:

B

Explanation:

A complex and unpredictable password would prove very hard to guess or deduce for any attacker.

3 0
4 years ago
Other questions:
  • Whats the agenda for annual general meeting ??
    10·1 answer
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • Using the drop-down menu, complete the following questions based on your knowledge of variables. is a value that can be used onl
    7·1 answer
  • What is an allocation unit?
    10·1 answer
  • In order to plan George’s birthday, his father gave him a list of people who attended his birthday for the last five years. What
    8·1 answer
  • What is the name of the technology that is typically implemented on switches to avoid Ethernet connectivity problems when the wr
    11·1 answer
  • ​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted
    8·1 answer
  • Among us Question. Worth 15 Points.<br> Which Vents do the Admin Vents Connect?
    14·2 answers
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!