1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
12

What does the rule of five say?

Computers and Technology
2 answers:
Anuta_ua [19.1K]3 years ago
6 0

Answer:

The rule of five is the "five daily actions that will help you achieve your goal/get your goal to completion".

Explanation:

The Rule of five was proposed by Canfield and Hansen as to what they would do to help them achieve their aim of having their book titled " chicken soup for the soul " in 1993 to the top of New York times bestseller list.

They consulted different experienced sellers and producers of books in the line of book publishing and sells but overwhelmed with loads of information they decided to create for them selves what is known as the " rule of five" which listed out five things to do to get their goal to completion. and this rules were:

  • having five radio interviews everyday
  • sending out five copies of their work to editors for review everyday
  • calling five network agencies to buy their book
  • giving a seminar to at least five people and selling their books to them
Evgesh-ka [11]3 years ago
3 0
It is presidents roles or god roles
You might be interested in
In gaming, "rendering" refers to:
jarptica [38.1K]
 The answer to your question is, rendering is<span> the process of generating an image from a 2D or 3D model.</span>
5 0
2 years ago
Read 2 more answers
Software development team leaders need blank skills to excel in directing their teams
IrinaK [193]
I mean, this is tricky because there's a lot of skills they'd need - c<span>ommunication, leadership, organisation, confidence etc. Is there a list of answers to choose from?</span>
5 0
3 years ago
Read 2 more answers
Daniel makes changes to a workbook named “Results.” He saves the file as “New Results” but did not realize that a worksheet name
elena55 [62]
All he would need to do is go into the sheet and change the name again. This will change the HTML so the computer will not be confused. The name should make sense, but he completely different from the original name :)
7 0
3 years ago
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
2 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • Write the definition of a method, oddsMatchEvens, whose two parameters are arrays of integers of equal size. The size of each ar
    10·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
    9·2 answers
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • Applications of kinematics in computer engineering​
    7·1 answer
  • Your project will require a 7-day work week rather than the traditional 5-day. How can you adapt the software to this new schedu
    15·1 answer
  • What do earthquakes and tsunamis have in common?
    13·1 answer
  • Set of general format used to write program in any programming language?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!