1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
8

Think of a recent occasion when you became upset with a friend or family member. How did you handle the situation? How did you c

onfront the person involved in the situation? Did you identify the problem together with the person or persons involved in the situation? What was the solution? Did you request help from an unbiased third party to reach a solution if the problem persisted.
Computers and Technology
1 answer:
bekas [8.4K]3 years ago
4 0

Answer:

You would identify the problem together with the person or persons involved.

Explanation:

You might be interested in
What is a browser? Give one example
Harman [31]
It is a program that may be used by a user to access files and navigate the World Wide Web. An example of this would be Firefox, Chrome, Safari, etc.
3 0
3 years ago
Read 2 more answers
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
2 years ago
What is your favorite film and what makes it good?
Gala2k [10]

Answer:

My Favorite film is The Old Guard

Explanation:

I like The Old Guard because it has action an etc.

4 0
2 years ago
Read 2 more answers
A personal computer uses a number of chips mounted on a circuit board called microprocessor. system board. daughter board. mothe
AveGali [126]
I am almost 100% sure that it is called a microprocessor 
8 0
3 years ago
The bank has a website that’s been attacked. The attacker utilized the login screen, and rather than entering proper login crede
RoseWind [281]

Answer:

C.SQL Injection

Explanation:

C.The text shown is the classic example of a basic SQL injection to log into a site

7 0
3 years ago
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • How do open online courses help with independent learning? (1 point)
    13·2 answers
  • 0.005098 megaliters to liters. Show your work.
    11·1 answer
  • The identification of critical information is a key part of the OPSEC process because: a) It is required by the JTF commander to
    13·1 answer
  • Generate the requested sets using only set builder notation and the provided sets. Some problems may require you to build one or
    15·1 answer
  • The work day has just started and you receive reports that the inventory management server is not accessible on your company's n
    7·1 answer
  • Image
    9·1 answer
  • Ashley works for a company that helps hospitals hire new doctors. They have written a list of strategies that can be used to int
    12·1 answer
  • 4.7 Code Practice: Question 2
    7·1 answer
  • Addition substraction and multiplication are examples of the set of _____ provided by the int data type
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!