1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
2 years ago
14

What is self management.​

Computers and Technology
2 answers:
OLEGan [10]2 years ago
8 0

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

Rzqust [24]2 years ago
5 0

<em>Self</em><em> </em><em>management</em><em> </em><em>is</em><em> </em><em> </em><em>the ability to regulate</em><em> </em><em>own</em><em>'</em><em>s</em><em> emotions, thoughts, and behaviors effectively in different situations.</em>

You might be interested in
Your friend Amy calls you asking for help with her new LCD monitor. She says the monitor isn't showing the whole picture. What i
swat32

Answer:     probably 1080p (which is HD)

Explanation:    Lcd monitors mainly support 1080p.

3 0
2 years ago
Who is in the age range of 13-15 and wants to join a mine craft smp?
Ratling [72]

Answer: Wow that's really cool!

3 0
2 years ago
Which is the best description of a computer virus?
MatroZZZ [7]
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
6 0
2 years ago
Read 2 more answers
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
2 years ago
Java Eclipse homework. I need help coding this
olganol [36]

Answer:

I can't just do your project but use this as a head start.

Explanation:

public class TableOfBases

{

   public static void main(String[] args)

   {

       // print out "Decimal    Binary   Octal   Hex    Character";

       //  write a for loop from 65 to 90

       for (int i ...  ) {

         // get a string for integer i with base 2

           String binary = Integer.toString (i,2);

         // get a string for integer i with base 8

           String octal = Integer.toString( ...   );

         // get a string for integer i with base 16

           String hex =  ...

        // get a char for a chararater that has ASCII code i

           char ch = (char) i ;

         // print out binary, octal and hex, and ch

       }

   }

}

/*

Project... Basically Speaking

Create a project called TableOfBases with class Tester.

The main method should have a for loop that cycles through the integer values

65 <= j <= 90 (These are the ASCII codes for characters A – Z).

Use the methods learned in this lesson to produce a line of this table on each pass

through the loop. Display the equivalent of the decimal number in the various bases

just learned (binary, octal, and hex) as well as the character itself:

Decimal Binary Octal Hex Character

65 1000001 101 41 A

66 1000010 102 42 B

67 1000011 103 43 C

68 1000100 104 44 D

69 1000101 105 45 E

70 1000110 106 46 F

....

71 1000111 107 47 G 72 1001000 110 48 H 73 1001001 111 49 I 74 1001010 112 4a J 75 1001011 113 4b K 76 1001100 114 4c L 77 1001101 115 4d M 78 1001110 116 4e N 79 1001111 117 4f O 80 1010000 120 50 P 81 1010001 121 51 Q 82 1010010 122 52 R 83 1010011 123 53 S 84 1010100 124 54 T 85 1010101 125 55 U 86 1010110 126 56 V 87 1010111 127 57 W 88 1011000 130 58 X 89 1011001 131 59 Y 90 1011010 132 5a Z

*/

7 0
2 years ago
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • What does Adsl stand for?
    7·2 answers
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
    10·1 answer
  • In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
    6·2 answers
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • Y'+2y = 5-e^(-4x), y(0)=-11
    9·1 answer
  • One can find mountain ranges, elevation levels, and deserts on a physical map.
    15·2 answers
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • A new thread begins its life cycle by transitioning to the ________ state. Group of answer choices new runnable waiting terminat
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!