1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
15

In a science study group, Leonardo explains how atoms make up molecules. Talia repeats what Leonardo says in her own words. How

is Talia practicing active listening? She is reflecting on what has been said. She is politely disagreeing with Leonardo. She is asking Leonardo a lot of questions. She is focused on only important information.
Computers and Technology
2 answers:
KatRina [158]3 years ago
7 0

Answer:

A she is reflecting on what leonardo said but in her own words

Explanation:

o-na [289]3 years ago
4 0

Answer:

A: She is reflecting on what has been said.

Explanation:

Edge 2020

You might be interested in
Why is it a good idea to leave an interview being courteous and polite?
JulsSmile [24]
It Will Show How Humble You Are. It will also show your ability to control emotions.
8 0
4 years ago
Explain the complement of a number along with the complements of the binary and decimal number systems.why is the complement met
umka2103 [35]

olha so olha la que bacana bonito

3 0
3 years ago
BitLocker Encryption can be deployed three ways. Identify which of the descriptions best describes the Computer Authentication m
ch4aika [34]

To  know  the descriptions best term about the Computer Authentication method is that On the motherboard of many laptops is a chip known as the TPM (Trusted Platform Module) chip. The BitLocker encryption key can be found on the TPM chip (also called the startup key).

<h3>How can a computer be verified?</h3>

The user or machine must demonstrate their identity to the server or client during authentication. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are further options.

Therefore, Data theft or exposure from lost, stolen, or improperly retired computers is a hazard that is addressed by the OS system-integrated data protection feature BitLocker Drive Encryption.

Learn more about Computer Authentication method from

brainly.com/question/3522088
#SPJ1

3 0
1 year ago
How do you make a triangle on art.kano.com
blsea [12.9K]

Umm, I guess you just try to do one? I don't know.. Sorry if I couldn't help out.

I believe you can do it!

7 0
3 years ago
Read 2 more answers
Designing advanced power systems for naval vessels is an example of nuclear engineering.
Ugo [173]

The answer to your question is,

True.

-Mabel <3

7 0
3 years ago
Read 2 more answers
Other questions:
  • A set of programs that enable hardware to process data is
    6·1 answer
  • Radio waves pros and cons
    10·2 answers
  • Emma has used copyright works of a number of artists in her photo album and cited all of them except one. She may be caught for
    6·2 answers
  • What are the basic components of a Production System?
    6·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • Corinne is taking a chemistry class in college. A lab assignment asks students to track the melting point of ten different subst
    8·1 answer
  • When is a chart legend used
    8·2 answers
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • Which factors have led to the fast growth in IT​
    13·1 answer
  • when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!