1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
12

Kathy is a senior teacher in her school. She is conducting a group discussion between parents and teachers. Her role is to ensur

e that each member of the group gets a chance to voice an opinion. She also keeps track of the time as the discussion progresses. Which role is Kathy performing in the group discussion
Computers and Technology
2 answers:
guajiro [1.7K]3 years ago
6 0

Answer:

mediator

Explanation:

The mediator acts as a neutral third party in a discussion. His/her role is to try to facilitate and maintain a certain control on the topics of the discussion. They try to manage the interaction between the opposing parties and specially in a parents-teachers discussion will try to keep everyone calm done and respectful of the other party.

Their role also involves assigning certain order and time limit to the participation of each parent or teacher, while encouraging everyone to participate. They also establish the topics that will be discussed and tries to focus the discussion only on the specific topics. The mediator can also try to propose certain possible solutions or alternative actions.

Fynjy0 [20]3 years ago
3 0
She is the leader of the discussion
You might be interested in
What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red
igor_vitrenko [27]

Answer:

Data Deduplication

Explanation:

In computing, data deduplication is a technique for eliminating duplicate copies of repeating data. This is also called single-instance storage.

Only applicable to Windows Server 2012 and newer versions, Data deduplication techniques ensure that only one unique instance of data is retained on storage media, such as disk, flash or tape.

Cheers

7 0
3 years ago
A Hierarchy Custom Setting stores a specific URL for each profile in Salesforce. Which statement can a developer use to retrieve
Mariana [72]

Answer:

The correct answer is option (B) "{!$Setup.Url_Settings__C.URL__c}".

Explanation:

In computer programing using Visualforce, "$Setup" refers to a global merge field that gives the user access to hierarchical custom settings. In this case, the developer needs to retrieve the correct URL to access the current user's profile and display this on a Visualforce Page. "$Setup" will give the developer access to the hierarchical custom settings in Visualforce, and the command "Url_Settings__C.URL__c" will provide the root access to the current user's profile.

4 0
3 years ago
If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
dezoksy [38]

Answer:

By the record ID

Explanation:

5 0
3 years ago
Which of the following are examples of software? Check all of the boxes that apply.
dezoksy [38]

Hey!

------------------------------------------

<h3>Answers:</h3>

Operating System

Web Browser

Word Processor

Device Driver

------------------------------------------

<h3>Explanation:</h3>

Software is a set of data that tells the computer what to do. Each of the answer above tell the computer something specific to do.

The operating system are basic functions that make the computer run smoothly.

The web browser is telling the computer you want to look something up like in internet explorer, firefox, and chrome.

The word processor is a piece of software that tells the computer that you want to format a piece of text like in Microsoft word.

The device driver is a piece of software that controls a connected device like a phone or another computer.

------------------------------------------

Hope This Helped! Good Luck!

4 0
3 years ago
Read 2 more answers
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
Kaylis [27]

Answer:

Explanation:

We must follow several steps:

  1. We must click in the image
  2. Click Image Tools > Format
  3. Click the date under Crop
  4. We must resize the image, or Trim one side, Trim two adjacent sides, Trim the same fragment.
  5. Click the Crop button again if you finished

In addition, we can change the form of the image, we have a lot of options in crop to shape.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • Which device or software application detects errors in system configurations?
    8·1 answer
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • Is instant messaging a form of synchronous communication
    10·1 answer
  • What are the three default security levels within software restriction policies?
    12·1 answer
  • Which type of optical scanner works in a manner similar to a copy machine?
    15·1 answer
  • What is a text designed for editing and authoring code is<br> A code editor <br> B
    9·1 answer
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
  • What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!