1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
9

Match the personality traits with their description

Computers and Technology
2 answers:
Crank3 years ago
7 0

Believing in your capabilities and demonstrating confidence in the tasks you perform - Self Esteem

Being loyal, sincere, and trustworthy in your job - Honesty

Being friendly and communicating enthusiastically with co workers - Sociability

Being accountable for your actions - Responsibility

Hope this helped!

~Just a girl in love with Shawn Mendes

Zielflug [23.3K]3 years ago
5 0

Answer:

  1. <em><u>Self</u></em><em><u> </u></em><em><u>esteem</u></em>
  2. <em><u>honesty</u></em><em><u> </u></em>
  3. <em><u>sociability</u></em>
  4. <em><u>responsibility</u></em>
  5. <em><u>I</u></em><em><u> </u></em><em><u>did</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>according</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>questions</u></em><em><u> </u></em><em><u>in</u></em><em><u> </u></em><em><u>first</u></em><em><u>.</u></em>
  6. <em><u>Hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>helps</u></em><em><u>.</u></em>
  7. <em><u>#</u></em><em><u> </u></em><em><u>I</u></em><em><u>. </u></em>
You might be interested in
(PLEASE HELP!! I'll award brainiest!!)
Bas_tet [7]

Answer:

Repair

Have a good day

3 0
3 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Help!! Best answer will get Brainliest!!
Eddi Din [679]

Answer:

answer(s):

-set goals

-select a topic

-write down research questions

Hope this helped and sorry for the bold. <3

Explanation:

6 0
3 years ago
Read 2 more answers
Never mind I got it
sergiy2304 [10]
<span>She is estimating the future profits with an estimate of long-term sales and the actual cost incurred.</span>
5 0
3 years ago
Read 2 more answers
The space where text and content is entered and positioned for onscreen reading or printing
tino4ka555 [31]

Answer:

Page.

Explanation:

A page typically occupies the largest portion of a document layout as it houses the main writeup or content of the document. The text contained in a document is written on a the main page of the document. The main page is surrounded by the page margin, which is an area which separates the tips or edges of an entire papwr and the writing area (page) of the document. The insertion point refers to an indicator which shows the position which a typed character will fall or be placed. Content written on a document's page is what is printed when the document is to be printed out and test entered on the page are what is seen by the reader.

4 0
3 years ago
Other questions:
  • Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
    10·2 answers
  • what is the goal of technology A. to understand how the natural world functions B. to study the natural world C. to improve the
    9·1 answer
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int
    11·1 answer
  • Identify a true statement of a JavaScript program in a web form.
    10·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • I need help with getting a profile pic
    5·1 answer
  • Someone, please answer this.
    15·1 answer
  • Write down the stages in the information prcessing cycle in correct order​
    5·1 answer
  • 1) a program that is designed to perform only one task.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!