Answer: Donald, the branch manager displayed people skills
Explanation: People skills are a combination of behavior and behavioral interactions between people. There are many abilities that fall under the category of people skills, for example, personal effectiveness, interactive skills and negotiation skills. While the customer was shouting, Donald patiently heard and tried to calm the customer which reflected that he respected and valued the customer and kept a positive behavior towards the customer.
Answer and Explanation:
Omnidirectional antenna are those antennas which receives the signals from multiple directions equally.These are the antennas that cannot get the signal from a particular direction thus gives the low throughput.
To get high throughput, directional antennas should be installed because they receive the signal from a particular direction only .Thus the signal received from these antenna work for a certain area.Example-Television antenna at homes are directional antennas names as Yagi-uda antennas.
Answer:
SuperFetch
Explanation:
Superfetch is a memory management technique on windows service that enables or fetch frequently use applications on systems and launch them faster because the frequently use applications has been preload into the system memory for easy access when they want to be used.
SuperFetch always takes notice of all application running on your system in which when you exit a frequently used application SuperFetch will preload them immediately since it is saved on the system memory.
One of the most important part of Superfetch is that it saves alot of time because you don't have to search the applications before you get access to them in as far as the application was frequently used.
Answer: PKI certificates
Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.
PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.