1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
7

What kind of skill is persuasion?

Computers and Technology
1 answer:
abruzzese [7]3 years ago
7 0

Answer:

soft skill

Explanation:

You might be interested in
Enlist the various data analysis methods for study of Infrasonic waves, Seismic waves, Earthquake prone areas and how AI can be
snow_tiger [21]

Answer:

Throughout the clarification segment below, the essence including its query is mentioned.

Explanation:

  • The analytical techniques utilize magnetic fields that allow the waves to be analyzed.
  • They sometimes use echolocation strategies.
  • It is possible to be using artificial intelligence to research potential forecasts. Climate, improvements throughout the climate as well as other things.
  • Like toxic waves, this will be capable of predicting tides.
5 0
2 years ago
Design a module named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prom
Sergeu [11.5K]

Explanation:

Module getNumber (Integer Ref Value)

Display "Display a number"

Input number

End module

Module main ()

Declare Integer number x = 1

Declare Real number y = 2.5

Display( x, " " ,y)

Call changeUS (x,y)

Display( x, " " ,y)

End module

5 0
3 years ago
What is the index of 7 in this list?
Ganezh [65]

Answer:

Assuming this is 0 based array indexing, it would look like this...

[ 5, 6, 10, 7, 3, 2.5 ]

[ 0, 1, 2, 3, 4, 5, 6 ]

The index of 7 would be 3.

6 0
3 years ago
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
jekas [21]

Answer:

the user should disable file and print sharing on the laptop

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question in order to prevent this the user should disable file and print sharing on the laptop. This is because this file and printer sharing allows users to see your files that you have available as shared and copy or print those files. Which if they are sensitive data you should just disable this option so that people on the same network cannot see or access these files.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requir
castortr0y [4]

Answer:

Dynamic Multipoint VPN

Explanation:

4 0
2 years ago
Other questions:
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • An ______ is a simplified image. [4 letters]​
    7·2 answers
  • What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??
    12·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • Convert (35.125)10 to binary
    9·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Im learning about AI in my class and I'm confused about these two questions
    9·2 answers
  • What are the two biggest strength as a student
    7·2 answers
  • Uh can somebody help me
    6·1 answer
  • the application you attempted to authenticate to is not authorized to use cas. contact your cas administrator to learn how you m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!