1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
11

What are TWO examples of soft skills?

Computers and Technology
1 answer:
Elanso [62]3 years ago
3 0
Computer programming and throubleshooting
You might be interested in
What is statement used to communicate ones feelings in a nonconfrontational manner
makkiz [27]

"I am" statements are very well to communicate with people about your feelings in a non confrontational manner.


6 0
3 years ago
Create a cell reference in a formula by typing in the cell name or
il63 [147K]

Answer:

D. Clicking the cell

Explanation:

Clicking the target cell is an alternative way of typing in the cell name when creating a cell reference in a formula.

Hope this helps!

8 0
3 years ago
Read 2 more answers
Hi, please help me.solution.​
Fed [463]

Answer:

aahdbdnsjajaissjdjdhskakwjdhbebs

3 0
3 years ago
How to get amount after a percentage increase in excel​
Tresset [83]

Answer:

First: work out the difference (increase) between the two numbers you are comparing.

Increase = New Number - Original Number.

Then: divide the increase by the original number and multiply the answer by 100.

% increase = Increase ÷ Original Number × 100.

Explanation:

3 0
2 years ago
Read 2 more answers
The retention of encoded information over time refers to
Crank

It refers to Storage

7 0
2 years ago
Other questions:
  • A suspension system that allows one wheel to move up and down with minimal effect on the opposite wheel is called what? A. Stabi
    14·2 answers
  • A computer ____ is the amount of data (typically measured in bits or bytes) that a cpu can manipulate at one time.
    8·1 answer
  • Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
    5·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • Quiero borrar mi cuenta como le hago ?
    6·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • C. There are two types of computer on the basis of size. true or false​
    5·1 answer
  • PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
    12·1 answer
  • You're as smooth as Tennessee whiskey
    8·2 answers
  • How do i automate survey monkey results to my email
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!