1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
5

To extract detailed and comprehensive responses from your client, use the _____ questioning technique.

Computers and Technology
2 answers:
nikklg [1K]3 years ago
8 0

Answer:

what do you need To extract detailed and comprehensive responses from your client?

liubo4ka [24]3 years ago
4 0

Answer:

I think it’s open ended question technique

Explanation:

but I would definitely change it if’s it wrong and I’m also sorry if it is

You might be interested in
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
Individuals who break into computer systems with the intention of doing damage are called​ _____________.
notka56 [123]
I think the answer is hackers
7 0
3 years ago
Drew is creating a game that stops the timer when the hourglass
Lana71 [14]
Stops the hourglass then unstop
6 0
3 years ago
Match the terms with their definitions.
Sever21 [200]
Phishing is 2
clickjack is 1
malware is 3
single signon is 4

Internet safety tip: Single Sign-On is unsafe. The others are made by hackers with no life and no heart.

5 0
4 years ago
Read 2 more answers
"The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
Hatshy [7]

Answer:

Active Directory

Explanation:

The 2012 R2 Windows Server  is the 6th version of  Windows Server server operating system which is made by Microsoft. It is a part of the Windows NT family of the operating systems.

Active Directory helps to store the default user profiles as well as the user login scripts.

It helps to assign the system policies, assign  permission to the users overt he network resources and also to deploy software in a centralized manner.

3 0
3 years ago
Other questions:
  • Pages with obvious problem with functionality or errors in displaying content
    11·1 answer
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • A dendrochronologist interprets:
    10·2 answers
  • What problem does chlorofluorocarbon (CFC) create?
    5·1 answer
  • The smallest unit of storage in the following list is a
    7·1 answer
  • Playstation network live updates pes 2018 does it cost extra
    13·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • Know when the double, int, String, and char data types are best used. Example: I would store a social security number in a strin
    7·1 answer
  • The meaning of belt drives
    10·1 answer
  • What is the definition of shape
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!