1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
6

During his last performance review, Franco's boss urged him to set some short-term and long-term sales goals to help him perform

better at work. Which workplace skill does Franco's boss want him to improve? A- interpersonal skills B-personal hygiene and grooming C- self-confidence D- motivation
Computers and Technology
2 answers:
Evgesh-ka [11]3 years ago
6 0

Answer:

Motivation" HOPE THIS HELPS THANK YOU.

son4ous [18]3 years ago
3 0

Answer:

The answer is "D- Motivation"

Explanation:

Franco's boss asked him to set himself goals because having achievable goals helps you motivate yourself.

You might be interested in
str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
Lena [83]

Answer:

It gives a new string

Explanation:

In programming; when two or more strings are concatenated by a concatenating operator, the result is always a new string.

From the question, we have that

str1 = "Good

str2 = "Evening"

Let's assume that + is the concatenating operator;

str1 + str2 = "Good" + "Evening" = "GoodEvening"

The result of concatenating str1 and str2 is a new string "GoodEvening" while str1 and str2 still maintain their original string value of "Good" and "Evening"

5 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
If you are uploading files you plan to edit online, you will need to convert them to Google Drive format. T or F
Amiraneli [1.4K]

Answer:

save as a word document (.docx) to keep editing offline then copy and paste into the google doc

5 0
3 years ago
Capacity requirements are computed by multiplying the number of units scheduled for production at a work center by the:
podryga [215]

Answer:

.

Explanation:

5 0
3 years ago
Which of these is a major mobile game developer?
Firlakuza [10]
Im thinking Zynga because it has tons of games
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is tuple and attribute of a relation​
    11·1 answer
  • Who is the founder of javascript? ​
    14·2 answers
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • (3 points) Write a program to process two large chunks of data (e.g., a large 3D array and an array of self-defined structures w
    11·2 answers
  • Select each task that may be completed using a word processor.
    8·2 answers
  • The physical parts of the computer are known as?
    14·1 answer
  • Which of these organs is not found in the excretory system
    7·2 answers
  • Which of the following situations would not require knowledge of networking?
    11·2 answers
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
  • Choose the answer that best completes the visual analogy.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!