1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
5

What is constructive criticism?

Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
7 0

Answer:

a. Advice and possible solutions intended to help or improve something

Explanation:

The answer is a because constructive criticism is when you help someone do/get better at something, through positivity.

You might be interested in
Built-in user accounts include only the Administrator account created during Windows installation True False
Semenov [28]

Answer: True

Explanation:

When an OS is installed, the first account created is the built -in user account. It is the administrator account for the purpose of recovery and to facilitate the set up.

8 0
3 years ago
How to disappear completely from the internet pc magazine
GREYUIT [131]

In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.

The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.

The steps that are needed to disappear from the internet include:

  • Delete your social network accounts.
  • Delete your email accounts.
  • Use search engines to track your old activities online and delete them.
  • Falsify the accounts that can't be deleted.
  • Unsubscribe from mailing lists.

Read related link on:

brainly.com/question/24902823

4 0
3 years ago
"Bullet Lists" can be which of the following?
MariettaO [177]

Answer:

letters and numbered

Explanation:

7 0
4 years ago
Read 2 more answers
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
xz_007 [3.2K]
This is in fact false to my knowledge
4 0
4 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
3 years ago
Other questions:
  • Which of the following mountain ranges stretches from Alabama to Canada?
    10·1 answer
  • When you open a stream for both reading and writing files, what must you always remember to do at the end?
    10·1 answer
  • What does a computer do with what it receives from the interpreter?
    14·1 answer
  • What are two reasons for converting a document or record into a digitized format?
    6·1 answer
  • As soon as I can, I will make a discord server for all brainly users. Would anyone like to join it once its set up? (only the di
    8·1 answer
  • (a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many
    10·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • Staff in several departments interact with the order processing system and will be affected by any
    9·1 answer
  • Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
    15·1 answer
  • Advantages and disadvantages of a watch tower​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!