1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
13

Quality, personal attention, leadership, and respect are examples of what?

Computers and Technology
2 answers:
tankabanditka [31]3 years ago
8 0
A good employee, everything u named is a good example of a good employee
Ierofanga [76]3 years ago
6 0

A company's values is the answer.

You might be interested in
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk
KengaRu [80]

Answer:

B) wireless local area network (WLAN)

Explanation:

WLAN which fully meaning is WIRELESS LOCAL AREA NETWORK is a network provider that enables two or more mobile phone user , desktop or computer user to connect and have access to the internet by simply connecting to the local area wireless network and this type of wireless network are more cheaper to install.

Example of where WIRELESS LOCAL AREA NETWORK can be found are : School building, Office building, School campus, home, among others.

4 0
3 years ago
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
What environmental hazards exist because of man’s desire for profit?
Anastasy [175]
Cutting down trees for paper
5 0
3 years ago
Read 2 more answers
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" claims that the act of hacking is a deep-seated psychologic
lisov135 [29]

Answer:

Explanation:

Based on the information provided within the question it can be said that the text that supports this is that in the book it states that this disorder is due to an obvious "addiction" to the sheer thrill of hacking, born of having found ways around the supposed ingenuity of "invulnerable" cyber security defences.

5 0
3 years ago
Read 2 more answers
What happens to energy as we move from step to step in a chain or web
scZoUnD [109]

Answer:Energy decreases as it moves up trophic levels because energy is lost as metabolic heat when the organisms from one trophic level are consumed by organisms from the next level.

Explanation:

6 0
3 years ago
Other questions:
  • Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
    13·1 answer
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • What does iSCSI stand for?
    5·2 answers
  • What are the 6 external parts of a computer
    14·1 answer
  • Jerry’s managing a Google Search campaign and would like to improve the position in which his ads appear. He’s increased his bid
    15·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • How would you justify using cloud computing?
    12·1 answer
  • which of the following cells can't be recarged? A. Electrode cell B. wet cell C. primary cell D. storage cell
    13·1 answer
  • Why are computers complicated?
    15·1 answer
  • Which of the following situations would not require knowledge of networking?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!