1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
11

What are TWO examples of soft skills?

Computers and Technology
1 answer:
Elanso [62]3 years ago
3 0
Computer programming and throubleshooting
You might be interested in
Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
Lemur [1.5K]
The first one, "The status bar appears at the top of the page and displays options to style your slides."

3 0
3 years ago
Read 2 more answers
Which of the following is a change that will not affect the pressure in a container?
ohaa [14]
"<span>changing the weight of the fluid" because the water in the container can be 1,000,000lb and the pressure will not change

hope that helped</span>
7 0
3 years ago
Read 2 more answers
Which popular file format loses some of the information from the image? JPEG TIFF RAW NEF
lisov135 [29]

Answer:

The popular file format that loses some of the information from the image is JPEG

Explanation:

4 0
2 years ago
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra
Komok [63]

Answer:

The answer is "second, third, and fourth choices"

Explanation:

In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:

The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.  

  • It doesn't ensure the extra key.  
  • It helps ensure there were no additional duplicates.  
  • It keeps strict access codes as well as keys command.  
  • It makes sure, that its key could not be linked to able to operate the lock.
6 0
3 years ago
Which of the following is the best example of market censorship
Papessa [141]
To bleep it out! hopefully this helped
4 0
3 years ago
Read 2 more answers
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • The faster the clock speed, the more of these the processor can execute per second. what are they?
    15·2 answers
  • 1. Problem solving is
    13·1 answer
  • What is a printed copy of computer output called
    10·2 answers
  • Can you guys help me plz <br> I want c++ code
    12·1 answer
  • . Define the process of Technological relationship
    12·1 answer
  • What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support?
    9·1 answer
  • What is meant by Information Retrieval?
    8·1 answer
  • At the heart of every computing device is a(n) _______________, which is usually a single, thin wafer of silicon and tiny transi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!