1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
11

Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a

nd describe the strategy, give an example of its use, and explain why its effective.
(computer science-communication)
Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
5 0

Answer:

Active listening is used to make things more clear when talking to other people. Whether it is on the phone or face to face active listening can reduce any unwanted barriers of communication. Getting rid of barriers can help a company save time rather than trying to explain things multiple times. This ultimately would lead to more goods or services being produced therefore making the company more efficient. There are many more reasons why this workplace tacit is useful but I personally believe this is one of the more used ways.

I really hope this works for you!

You might be interested in
Which of these is a physical health benefit provided by playing team sports? A. a spiritual connection to others B. lower choles
AfilCa [17]

Answer:

B. lowering cholesterol

Explanation:

Edge 2021, made a 100 on the quiz. Good luck :)

3 0
3 years ago
Read 2 more answers
Write the code for invoking a method named sendObject. There is one argument for this method which is of type Customer.Assume th
Dafna1 [17]

Answer:

sendObject(John_Doe)

Explanation:

To invoke a method, simply call the name of the method, followed by it's arguments in parenthesis. i.e methodname(argument).

In this case, the name of the method is sendObject and it's argument is a Customer object stored in or referenced by a variable John_Doe.

The above is true since the method is defined in the same class that calls it. Otherwise, it is not valid.

6 0
4 years ago
A file name extension provides what information about a file? the file format the file length the file permissions the file crea
kenny6666 [7]
A file name extension provides the file format
4 0
3 years ago
Read 2 more answers
The next scenarios are not part of the Java simulation. Just use your best thinking to answer the
umka21 [38]

Answer:

A) Vector is an upward, downwards, left, and right directions for Emily vector is in the upward, downwards, and right directions for Fran.

B) The force of weight and gravity in the downward direction, the normal force in the upward direction, acceleration force in the right direction and the frictional force in the left direction. Fran doesn't have a frictional force.

C) Emily's velocity will slow down since the ground is being countering her velocity and slowing her down in the opposite direction until she stops. Fran's speed will be constant since there is no friction to slow her down so she will continue to move unless she hits a wall.

Explanation:

3 0
3 years ago
A single decalaration statement can declare an array of characters and an array of integers.
vagabundo [1.1K]
Answer: i think it’s true
8 0
3 years ago
Other questions:
  • Search engines enable you to
    13·2 answers
  • Where is the BIOS chip located?
    6·2 answers
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    15·1 answer
  • PowerPoint is great for brainstorming and producing creative pieces because it
    13·2 answers
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • According to company policy and administrator must logically keep the Human Resources department separated from the Accounting d
    5·1 answer
  • An ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the co
    10·1 answer
  • What are some random fun facts about Technology?
    12·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • 84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!