1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
13

What the central difference between negative and positive politeness?

Computers and Technology
2 answers:
tiny-mole [99]3 years ago
6 0

Answer:

Negative politeness is often used to make a request seem less infringing as people assess threatening aspects of communication using three components: Social distance, Relative power. Absolute ranking.

Step2247 [10]3 years ago
5 0

Answer:

<em>       Politeness </em>is universal, resulting from people's face needs: Positive face is the desire to be liked, appreciated, approved, etc. Negative face is the desire not to be imposed upon, intruded, or otherwise put upon.

    Positive face refers to one's self-esteem, while negative face refers to one's freedom to act. Participants can do this by using positive politeness and negative politeness, which pay attention to people's positive and negative face needs respectively.

  • What are positive face needs?

  One's face need is the sense of social value that is experienced during social interactions. Positive face refers to the need to feel accepted and liked by others while negative face describes the will to do what one wants to do with freedom and independence.

Negative politeness :

  Making a request less infringing, such as "If you don't mind" or "If it isn't too much trouble"; respects a person's right to act freely. In other words, deference. There is a greater use of indirect speech acts.

  • What is politeness in discourse analysis?

    In sociolinguistics and conversation analysis (CA), politeness strategies are speech acts that express concern for others and minimize threats to self-esteem ("face") in particular social contexts.

<em>Hope u got it</em>

<em>If you have any question just ask me</em>

You might be interested in
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Use the drop-down tool to match each definition to the correct word or phrase. The computer that responds to requests from the c
Lera25 [3.4K]

Answer:

The computer that responds to requests from the client computer:  

Server

Connects network devices or different parts of a network:  

Switch

A piece of equipment that directs data where it should go:  

Router

Connects many different Ethernet devices and allows them to connect to the network with one connection:  

Hub

The computer that uses service provided by a server:  

Client

Explanation:

6 0
3 years ago
Desertification is caused by
Alex Ar [27]
<span>it is caused by A.overgrazing
</span>
5 0
3 years ago
The term eof represents
rewona [7]

Answer:

EOF stands for End Of File

Google explains it well: EOF is a condition in a computer operating system where no more data can be read from a data source. The data source is usually called a file or stream.

8 0
3 years ago
Read 2 more answers
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
Other questions:
  • You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
    11·2 answers
  • "write a program that reads two floating point numbers and prints their sum difference and product."
    13·1 answer
  • Which elements are in the Sort dialog box? Check all that apply.
    9·1 answer
  • The following code accomplishes which of the tasks written below? Assume list is an int array that stores positive int values on
    9·1 answer
  • "Which of the following is not an example of a project? Select one: a. Creating a website for a company b. Raising money for a d
    5·1 answer
  • George is sketching a wireframe representation of the home page of his website. What aspect of the home page would be impossible
    11·1 answer
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • What department is cyber security
    6·2 answers
  • Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access
    11·2 answers
  • Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!