1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
6

Integrity, positive attitude, and punctuality are considered __________ skills. a. interpersonal b. mathematical c. personal d.

verbal
Computers and Technology
2 answers:
densk [106]3 years ago
8 0

Integrity, positive attitude, and punctuality are considered C. personal skills because they have to do with ones self.

Airida [17]3 years ago
4 0

Answer:

These are personal skill

Explanation:

Interpersonal ;; how you deal with the others.

Mathematical ;; how you use maths.

Verbal ;; how you speak

Those are internal values. They do not fit those others. So personal.!

You might be interested in
The blank areas around the outside edges of a document are called the _____. a. settings b. margins c. blank space d. empty spac
nevsk [136]

I think it will be B margins

7 0
3 years ago
HURRY HELP THIS IS FOR CODING !!!! What are some real-life situations that require a program that is iterative? Include at least
Degger [83]

Answer:

A health service, a sales service, a social network, all because they require you to make a request to return a result

5 0
3 years ago
Read 2 more answers
What is a spark line? how is a different a chart​
Neporo4naja [7]

Answer:

A sparkline is a tiny chart in a worksheet cell that provides a visual representation of data.

5 0
3 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Other questions:
  • After unit and integration testing are completed, _________ testing ensures that all hardware and software components work toget
    7·1 answer
  • What is the maximum number of communication paths for a team of twenty people?
    5·1 answer
  • The top pane of the wireshark window, referred to as the __________, contains all of the packets that wireshark has captured, in
    5·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • What kind of music you guys play
    5·2 answers
  • 2y/3 - y-1/6 + 7y-1/4 = 2 1/6​
    5·1 answer
  • Write two eaxmple of operating system​
    14·2 answers
  • What are the common internal components to most electronic devices?
    10·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
  • You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of va
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!