1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
9

Match the personality traits with their description

Computers and Technology
2 answers:
Crank3 years ago
7 0

Believing in your capabilities and demonstrating confidence in the tasks you perform - Self Esteem

Being loyal, sincere, and trustworthy in your job - Honesty

Being friendly and communicating enthusiastically with co workers - Sociability

Being accountable for your actions - Responsibility

Hope this helped!

~Just a girl in love with Shawn Mendes

Zielflug [23.3K]3 years ago
5 0

Answer:

  1. <em><u>Self</u></em><em><u> </u></em><em><u>esteem</u></em>
  2. <em><u>honesty</u></em><em><u> </u></em>
  3. <em><u>sociability</u></em>
  4. <em><u>responsibility</u></em>
  5. <em><u>I</u></em><em><u> </u></em><em><u>did</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>according</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>questions</u></em><em><u> </u></em><em><u>in</u></em><em><u> </u></em><em><u>first</u></em><em><u>.</u></em>
  6. <em><u>Hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>helps</u></em><em><u>.</u></em>
  7. <em><u>#</u></em><em><u> </u></em><em><u>I</u></em><em><u>. </u></em>
You might be interested in
Which type of information should never be given out on social media?
zhenek [66]

Answer:

Sites like Face.book are full of valuable data for people who use social engineering to steal your identity on social media. You should therefore avoid sharing information that's used to verify your identity,

Explanation:

7 0
3 years ago
Read 2 more answers
What report shows which types of mobile devices visited a website?.
Lerok [7]

Answer:

Technology > Network report. All traffic > Source/Medium report.

Explanation:

hope this helps

8 0
1 year ago
Write a class declaration named Circle with a private member variable named radius. Write set and get functions to access the ra
Kazeer [188]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

class Circle{

// private member variable named radius

private:

double radius;

// get function for radius

public:

double getRadius(){

return radius;

}

// set function for radius

void setRadius(double rad){

radius=rad;

}

// returning area = 3.14159 * radius * radius

double getArea(){

return (3.14159 * radius * radius);

}

};

// Sample run

int main()

{

// Declaring object of Circle

Circle myCircle;

myCircle.setRadius(5);

// printing radius of circle

cout<<"Radius of circle is: "<<(myCircle.getRadius())<<endl;

// printing area of circle

cout<<"Area of circle is: "<<(myCircle.getArea())<<endl;

return 0;

}

4 0
3 years ago
The answer to this question
kvv77 [185]

E is the correct answer.

Risk is present, always. Risk can be good or bad. There is a risk you could win the lottery.

Furthermore, how we perceive risk is different than what risk is actually there.

Risk can be shared amongst members of a group or company and the amount of risk can be altered or ameliorated.

Risk can always be managed.

E is the correct answer.

6 0
3 years ago
Read 2 more answers
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added
Archy [21]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

  • Encapsulation relates to the pooling of data with techniques used by the database or the limitation of immediate access to many of the elements of the entity.
  • As data is being processed for transfer to the network, it's split into tiny pieces and a trailer and header are attached to each piece to help determine it.
  • It is a method of shielding data facts and preserving the object's data and actions from abuse by certain objects.

Therefore, Encapsulation is the right answer.

8 0
3 years ago
Other questions:
  • A(n) ____________________ stores copies of data or programs that are located on the hard drive and that might be needed soon in
    9·1 answer
  • What is the relationship between ionic bonds and cleavage
    13·1 answer
  • How to Save Power-Point presentation as a single file Web page that can be uploaded to the World Wide Web ?
    14·1 answer
  • What does the history feature in a web browser do
    10·1 answer
  • Anybody know this question???
    6·1 answer
  • Question 1:
    5·1 answer
  • How do u delete a post on brainly
    7·1 answer
  • Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56
    8·1 answer
  • What is the impact of VR on Educational Learning rather than games?​
    13·1 answer
  • A customer wants to increase his storage capacity by 25gb
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!