1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
2 years ago
13

What the central difference between negative and positive politeness?

Computers and Technology
2 answers:
tiny-mole [99]2 years ago
6 0

Answer:

Negative politeness is often used to make a request seem less infringing as people assess threatening aspects of communication using three components: Social distance, Relative power. Absolute ranking.

Step2247 [10]2 years ago
5 0

Answer:

<em>       Politeness </em>is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.

    Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.

  • What are positive face needs?

  One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.

Negative politeness :

  Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.

  • What is politeness in discourse analysis?

    In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.

<em>Hope u got it</em>

<em>If you have any question just ask me</em>

You might be interested in
)How to extract a specific element of item in a list?
pogonyaev

Answer:

List items are usually accessed using the indexing operator.

Explanation:

Depends on the language, and what you mean with extracting? Do you mean accessing or removing?

3 0
3 years ago
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
2 years ago
Read 2 more answers
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
Martha is developing a software program in C++ and has a question about how to implement a particular feature. She performs an o
VLD [36.1K]

Answer:

A blog

Explanation:

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is organised by posts.

7 0
3 years ago
You want to upgrade a server by installing an external SCSI tape drive. The system currently has a SCSI card and an internal SCS
jeka94

Answer:

You should disable termination on the Small Computer System Interface (SCSI) controller card.

Explanation:

SCSI is an acronym for Small Computer System Interface, which is also generally referred to as host bus adapter (HBA). The SCSI is typically a chip that controls the communication between the operating system (OS), storage devices such as hard disk drives and the host computer system. Also, it helps with the interpretation of the electrical signals between the Small Computer System Interface (SCSI) bus and the input-output bus for storage devices.

In this scenario, you want to upgrade a server by installing an external SCSI tape drive. The system currently has a Small Computer System Interface (SCSI) card and an internal SCSI hard drive. At bootup, the system fails to recognize the new tape drive. To solve this problem, you should disable termination on the SCSI controller card so that only the external SCSI tape drive will be active and the SCSI won't be detected.

6 0
2 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Consider the following partial class definitions: public class A1 { public int x; private int y; protected int z; ... } public c
    12·1 answer
  • Laxmi was not confident that she could learn to program a computer. When she found out that two girls with similar GPA’s in her
    5·1 answer
  • Write a program to randomly fill an array of float of 10 elements (use the rand() function and make sure to use #include ) in ma
    11·1 answer
  • Given a number count the total number of digits in a number
    12·1 answer
  • What ribbon command on the home tab can you use to change a cell fill color
    5·2 answers
  • What is a port?
    14·1 answer
  • 5. Nadia wants to calculate the total interest, which is the total amount of the payments minus the loan amount. In cell F6, ent
    8·1 answer
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
  • Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all intege
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!