1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
11

Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a

nd describe the strategy, give an example of its use, and explain why its effective.
(computer science-communication)
Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
5 0

Answer:

Active listening is used to make things more clear when talking to other people. Whether it is on the phone or face to face active listening can reduce any unwanted barriers of communication. Getting rid of barriers can help a company save time rather than trying to explain things multiple times. This ultimately would lead to more goods or services being produced therefore making the company more efficient. There are many more reasons why this workplace tacit is useful but I personally believe this is one of the more used ways.

I really hope this works for you!

You might be interested in
An Excel file that contains one or more worksheets
lutik1710 [3]

Answer:

three sheets

Explanation:

A workbook is an Excel file that contains one or more worksheets. Each of the workbook 039;s worksheets are in separate tabs on the bottom of the Excel window. By default, a new Excel workbook will contain three worksheets.

7 0
2 years ago
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash ca
weeeeeb [17]

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

5 0
2 years ago
What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
mart [117]

Answer:

Structured programming also known as Modular programming in which the program is made as a single structure.The execution is instruction by instruction.It mainly focuses on improving the quality,clarity and development time of a computer program.

The top-down approach works by breaking a complex algorithm into smaller parts called modules. The modules keep breaking until there is no space left for breaking them without hindering the originality.The breaking of the modules is prohibited after achieving a certain level of modularity . C language uses this approach.

Bottom up works exactly opposite of how the top-down approach works.This approach works in the most elemental level of solving a problem and going up with combination of several parts of the solution to achieve required results.

4 0
3 years ago
Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
Alenkinab [10]

Answer:

Its packing you're welcome :)

Explanation:

7 0
3 years ago
Read 2 more answers
The project manager of a software development team needs to hire someone to review every part of the software to make sure it wo
Zielflug [23.3K]

Answer:

code reviewer

Explanation:

In this scenario, the project manager should advertise for a code reviewer. Usually a development team has at least 2 code reviewers that are very familiar with the code that is being written for the project. Once sections of code have been completed it is usually the case that both the project lead and a code reviewer both review the entire software to look for bugs and note improvements that can be made to make the code more efficient.

4 0
2 years ago
Other questions:
  • (011001111)2=(?)10 can anyone solve this urgent <br><br> Hurry
    11·2 answers
  • . Write a swift programming code to perform following tasks a) Declare a variable that stores the age of a person b) Declare a c
    5·1 answer
  • Why is population composition by age important give reason​
    13·1 answer
  • 8.13 LAB: Elements in a range Write a program that first gets a list of integers from input. That list is followed by two more i
    8·1 answer
  • What correctly describes the features of the service called kickstarter?
    14·2 answers
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • In this exercise, you will get some practice with the __add__ method by implementing it for a class called ContactBook. This cla
    12·1 answer
  • Use the drop-down menus to explain how to locate the Consolidate dialog box.
    6·1 answer
  • What is the output?
    7·1 answer
  • The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied togeth
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!