1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svet_ta [14]
4 years ago
5

The dark side of communication involves interactions that are: Challenging; Difficult; Distressing; All of the above

Computers and Technology
1 answer:
Romashka [77]4 years ago
6 0
When we engage in actions that are designed to sustain or preserve a relationship what is it called
You might be interested in
A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a fi
neonofarm [45]

Answer:

Python file with appropriate comments given below

Explanation:

#Take the input file name

filename=input('Enter the input file name: ')

#Open the input file

inputFile = open(filename,"r+")

#Define the dictionary.

list={}

#Read and split the file using for loop

for word in inputFile.read().split():

  #Check the word to be or not in file.

  if word not in list:

     list[word] = 1

  #increment by 1

  else:

     list[word] += 1

#Close the file.

inputFile.close();

#print a line

print();

#The word are sorted as per their ASCII value.

fori in sorted(list):

  #print the unique words and their

  #frequencies in alphabetical order.

  print("{0} {1} ".format(i, list[i]));

3 0
4 years ago
Insurance can help you:
Blababa [14]
No it can not .............
3 0
4 years ago
Which guideline should you use when downloading software from the internet?
Anton [14]
Limiting your computer's vulnerability to malware is a crucial safe browsing habit. You can protect your computer by running antivirus<span> and </span>antimalware<span> software like </span>Bitdefender<span>, </span>Norton<span>, or </span>Kaspersky<span>. These programs can block malware from being installed and can remove it if it does get onto your computer. Even if you don't see signs of malware on your computer, running regular scans can catch any malware that has escaped notice.</span>
4 0
3 years ago
Read 2 more answers
How are entries ordered in a reference list
neonofarm [45]

Answer:

idijajahgajjayzickdjdjd

5 0
3 years ago
What is the name of the general ledger that tracks all bitcoin transactions?.
motikmotik

Answer:

The Name of the General Ledger that Tracks all Bitcoin Transactions is Called the Blockchain.

A Blockchain is a Growing List of Records, known as Blocks, that are linked together using Cryptography. Each Block in a Blockchain contains a cryptographic Hash of the Previous Block, a timestamp, and also the transaction Data.

3 0
3 years ago
Read 2 more answers
Other questions:
  • The Spell Checker can be found in which two locations in most word processing software?
    11·1 answer
  • Write a method isSorted that returns true if the list is in sorted (nondecreasing) order and returns false otherwise. An empty l
    12·1 answer
  • ​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around th
    6·1 answer
  • If a system responds to a change in input by moving further away from its equilibrium condition, what type of feedback has occur
    13·1 answer
  • Which hexadecimal number is equivalent to the decimal number 11?
    13·1 answer
  • Which is the best organizational flow for a project?
    15·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • If Tracy is facing right, which of the following commands can be used to turn her to face up?
    9·1 answer
  • Can anyone help explain this?
    13·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!