1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
6

In 125 words describe the steps to active listening.

Computers and Technology
1 answer:
Vikki [24]3 years ago
3 0

some key points to guide you:

- attentiveness

- understandment of materials

- eye contact

- good performance

- destressing

You might be interested in
Choose the missing method name.
leva [86]

Answer:

midpoint i'm pretty sure. :)

Explanation:

3 0
2 years ago
The Internet consists of interconnected computer networks throughout the world that everyone can use.
KiRa [710]
False, I'm pretty sure people in North Korea cant use it...
8 0
3 years ago
Read 2 more answers
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
Difference and similarity between cluster computing and Hadoop ecosystem?<br>​
Marysya12 [62]
  • Some things can be similar and still have some differences. The Hadoop ecosystem is known to be the add-ons that make the Hadoop framework more better for some particular big data needs and tastes.

The Hadoop ecosystem is made up of the open source projects and commercial tools that are often optimized to act on different kinds of work especially to big data. It is very flexible

The differences is that cluster is simply a combination of a lot of computers that is set up to work together as one system but a Hadoop cluster is a cluster of computers that is used only at Hadoop. Hadoop clusters are set up to analyze and storing large amounts of unstructured data only in a distributed file systems.

Learn more about systems from

brainly.com/question/10603992

7 0
3 years ago
Read 2 more answers
What is RAM and ROM​
Aleonysh [2.5K]

Answer:

Read-only memory, or ROM, is a form of data storage in computers and other electronic devices that can not be easily altered or reprogrammed. RAM is referred to as volatile memory and is lost when the power is turned off whereas ROM in non-volatile and the contents are retained even after the power is switched off.

8 0
3 years ago
Read 2 more answers
Other questions:
  • You receive an offer for a credit card that can be use to accrue points that
    11·1 answer
  • What will be returned when the following SQL statement is executed?
    5·2 answers
  • Which of the following is not something that consumers need to pay attention to order to make rational choices
    6·2 answers
  • What disese is sue suffering from
    15·2 answers
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More
    6·2 answers
  • The model for Diminishing Marginal Utility is ______ in nature.
    12·1 answer
  • A SOCCER club uses ICT to
    10·1 answer
  • G i r l s o n l y j o i n <br> id= ons jcuv jke
    13·2 answers
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!