1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
13

Item 8 Item 8 Shelby Black runs a very successful hair salon in downtown Los Angeles. One of Shelby’s tasks is to input positive

and negative customer reviews into her computer system. What type of information is Shelby gathering?
Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
8 0

Answer: Feedback

Explanation: Feedback is the reaction obtained in the form of information from the task a person has performed or any product. It gives the review of the service that is given by the customer, user etc.The reaction that is obtained can be a negative feedback or positive feedback.

Both types of feedback is necessary because it helps in the improvement of the service. The negative reaction will helps to change/improve the service that is not liked by the customer and positive feedback tells about the services appreciated by the customer. So, Shelby is also keeping the feedbacks for the same purpose for her salon business.

You might be interested in
which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
Viefleur [7K]

The filename that refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes its findings to ntldr is NTDetect.com.

<h3>What does a Ntdetect file do?</h3>

A part of Microsoft Windows NT-based operating systems that utilize the x86 architecture is ntdetect.com. It is utilized throughout the Windows NT startup process and is in charge of determining what fundamental hardware will be needed to launch the operating system.

Your computer starts the Windows XP operating system using the NTLDR and Ntdetect.com files, which are crucial system files. Occasionally, these files may get damaged, corrupted, or lost.

Learn more about program from

brainly.com/question/26497128
#SPJ1

5 0
1 year ago
_______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
Semenov [28]

Answer:

Functional Family Therapy

Explanation:

According to my research on different types of therapies, I can say that based on the information provided within the question the therapy being described in this scenario is called Functional Family Therapy. This is a type of therapy aimed at young teens roughly aged 11-18 who are exhibiting violent or negative behaviors and/or substance abuse. The therapist sits down with the child, their parents, and sometimes an officer of the law in order to get to the root of the problem and come up with different solutions that may help the child feel less angry and prone to act out.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
4 years ago
To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the _____ fe
Lera25 [3.4K]

To move the first line of text over five spaces and leave the other lines of the paragraph aligned to the left, use the FIRST LINE INDENT.

<h2>Your answer would be B. First Line Indent</h2><h3><u><em>hope this helps</em></u></h3>
4 0
3 years ago
Read 2 more answers
What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
Scrat [10]
<span>On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.</span>
7 0
4 years ago
Other questions:
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • Carlos own a hardware store.He currently is not using any software to track what he has in the store. .In one to two sentences,
    10·1 answer
  • Plz answer me will mark as brainliest picture included ​
    15·1 answer
  • Given the code segment below, complete the assignments as stated in the comments. struct aaa { int m; int nn; } struct bbb{ stru
    13·1 answer
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • What<br>are<br>the features of secondary storage media​
    13·2 answers
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • Write an expression that executes the loop while the user enters a number greater than or equal to 0.
    9·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!