1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
15

When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic

es begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.
Computers and Technology
1 answer:
omeli [17]3 years ago
8 0

Answer:

explain all background information first.

Explanation:

Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.

It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.

You might be interested in
Assume the availability of a function named oneMore. This function receives an integer and returns one more than its parameter.
jek_recluse [69]

Answer:

oneMore(oneMore(oneMore(oneMore(oneMore(0)))))

Explanation:

  • As a function has been explained which when given an integer results as a next integer. oneMore(given-integer)= next integer
  • As we are restricted to use 0 only and can't use operators like + - * /.
  • We have to obtain a value 5
  • So doing step-by-step:

             (oneMore(0))=1

             (oneMore(oneMore(0)))=2

             (oneMore(oneMore(oneMore(0))))=3

             (oneMore(oneMore(oneMore(oneMore(0)))))=4

             oneMore(oneMore(oneMore(oneMore(oneMore(0)))))=5

7 0
3 years ago
While approaching your parked car, the first step before getting in should be
Lady_Fox [76]

The answer to your question is:

A. Have the key in your hand.

8 0
3 years ago
Read 2 more answers
A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is m
Minchanka [31]

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

8 0
3 years ago
Write the definition of a function square, which receives an integer parameter and returns the square of the value of the parame
MatroZZZ [7]

Answer:

public static int square(int num){

       return num*num;

   }

Explanation:

Using the Java Programming Language, we declare a function named square as stated in the question, the return type of the function is stated as integer. And the the parameter it receives is an integer number called num.

To get the square of the number we use the expression num*num, and return the the squared value. When the function is called, it will receive one argument (an integer value), it will calculate the square and return it.

5 0
3 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
Other questions:
  • An “AI” (artificial intelligence) could be used in:
    10·1 answer
  • The agency responsible for maintaining a database of all operational continuity facilities is:
    8·1 answer
  • Partitioning the hard drive allows you to do which of the following?
    11·1 answer
  • You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the
    7·1 answer
  • C programming question
    6·1 answer
  • Need to know? Anyone feel like helping me not fail
    13·1 answer
  • Question 2 (6 points)
    11·1 answer
  • What are the features of boot sector virus​
    11·1 answer
  • What is the output of the following code?int *p; int *q; p = new int; *p = 43; q = p;*q = 52; p = new int; *p = 78; q = new int;
    5·1 answer
  • A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!