1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
3 years ago
10

How does it transform your ways of socializing

Computers and Technology
1 answer:
frez [133]3 years ago
4 0

How to transform your ways of socializing:

Know Yourself. The first and foremost reason why many people fail in effective socializing is the fact that they don’t know themselves well.

Be yourself. Another reason of failing to socialize or failing to make that “first impression” is that we try to mimic others.

Body Language. The way you walk, stand, talk, eat and sit… Each and every gesture and posture of yours speaks volumes about you.

Your attire. I had a client who had severe social anxiety. It was aggravated when her mother forced her to wear stuff that was too body revealing.

etc.

This was written from a biography about someones experience.

_____________________________

<em>Brainliest </em>would be greatly appreciated.

I found this!

______________________________

<em><u>#SpreadTheLove</u></em>

<em><u>#SaveTheTrees</u></em>

You might be interested in
________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
RSB [31]
Cell phones work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
4 0
3 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
_____ are the supertiny on-off switches in a chip that work collectively to calculate or store things in memory. Transistors Mul
Pepsi [2]

Answer:

Transistors

Explanation:

4 0
3 years ago
Hurry please i need this ASAP<br><br>What might be some advantages to keeping CSS and HTML separate?
marusya05 [52]

Answer:

The separation of HTML from CSS makes it easier to maintain sites, share style sheets across pages, and tailor pages to different environments. This is referred to as the separation of structure (or: content) from presentation.

Explanation:

I think this right don't add me right then add

6 0
2 years ago
The FTC found CardSystems Solutions and its predecessors __________ the FTC Act 15, U.S.
umka21 [38]

Take because it is lit

6 0
3 years ago
Other questions:
  • Algorithm for converting decimal into binary.
    7·1 answer
  • Which of these statements is true? Steve Jobs invented the mouse as an input device. Bill Gates invented the mouse as an input d
    6·1 answer
  • Each time the user selects an item from a list box in a web page, a postback occurs, the web page will redisplay, and the page_l
    12·1 answer
  • What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
    13·1 answer
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • Csc105 final graded project
    9·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • Which feature is not in ms PowerPoint​
    12·1 answer
  • Social media first became popular due to which development?
    8·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!