1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
6

Tyra is peer conferencing about her project with a friend. Tyra's friend provided feedback that Tyra does not agree with. What s

hould Tyra do? Group of answer choices Be kind and thankful Ignore the feedback Start the project over Tell her friend she is wrong
Computers and Technology
1 answer:
natulia [17]3 years ago
6 0

Answer:

Be kind and thankful

Explanation:

If Tyra does not agree with her friend's feedback, she does not have to say it outrightly to her friend. She has to use softer words to disagree. This is where being kind comes in.

Her friend has made efforts by providing this feedback Even if it is not exactly what she wants to hear. It would be polite for her to say thank you.

Then she has to respectfully disagree to avoid coming off as someone who is totally unreceptive of the opinion of others.

You might be interested in
Computer science practical on VB.NET. program 1. program to find the square of a number. write the code achieve it​
Korvikt [17]

Answer:

Module Program

   Sub Main()

       Dim num As Integer

       num = 4

       Console.WriteLine("The square of " & num & " is " & num * num)

       Console.ReadKey()

   End Sub

End Module

Explanation:

Very similar to the other program you posted.

6 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Programs that do the same thing every time they run are called...
Misha Larkins [42]

Answer:

predictable

Explanation:

because it repeat itself all time

6 0
3 years ago
What does NVRAM stand for
Julli [10]
Non-Volatile Random Access Memory
7 0
3 years ago
Read 2 more answers
Della is a special education teacher. In her classroom, students may use many different types of utility programs to make it eas
Assoli18 [71]

Answer:

accessibility

Explanation:

Della is a special education teacher. In her classroom, students may use many different types of utility programs to make it easier for them to use their computers. This category of utility software is known as accessibility.

6 0
3 years ago
Read 2 more answers
Other questions:
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • How can you clean out the scales in an electric iron without taking the iron apart? A. By rinsing the tank and holes with a wate
    12·2 answers
  • A process that allows software-based networked computers to run multiple operating systems and programs and share storage is cal
    5·1 answer
  • --------------------is a host that runs software to provide information, such as web content, to other hosts.
    9·1 answer
  • Why do we need to send emails
    12·1 answer
  • Cuales son los elementos de la programación?
    10·1 answer
  • To switch from one open document to another, press _____.
    6·1 answer
  • Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the te
    11·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • Consider the following code segment.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!