1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
2 years ago
10

The best way to help people in the contemplation stage of change is to:

Computers and Technology
2 answers:
Lelechka [254]2 years ago
7 0

Answer:

D. Point out the negative consequences of the behavior, so they see that the negative aspects do outweigh the positive aspects​

Explanation:

Natasha2012 [34]2 years ago
7 0

Answer:  I would say C because the others seem to harden and not very helpful.  When someone is in the contemplation stage of change they are weighing up the pros and cons of stopping the bad behavior or modifying it. They are undecided yet as to what to do, they are thinking about their options and this can take a long time. During this time though they are open to suggestions and tend to be more receiving to information from others as to how their behavior is effecting them and others, so I would suggest that the best way to help them would be to talk to them about their behavior, make suggestions in a non judgmental way as to how they could stop or modify their bad behavior, be there for them in a positive and informative way. You need to help them recognize how bad the behavior is for them and reinforce that ultimately they know what is best for them  Explanation: hope this helps :)

You might be interested in
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
An indention where the first line of text is indented and the second and succeeding lines start at the left margin is called ___
iren [92.7K]

Answer:

first-line indent

Explanation:

The answer is -- first-line indent

The "first-line indent" is a guideline provided by the APA or American Psychological Association for formatting or writing a reference page.

When we start writing text in a page, the first line on our page will line up from the left margin of the page and each line after that is the second and the succeeding lines will also start lining up at the left margin of the page when first line intend is turned on. This is called first-line indent.

Thus the answer is  first-line indent

4 0
3 years ago
Circuit-switched networks provide connection between two parties that: Group of answer choices is dedicated for use by the parti
loris [4]

Answer:

The answer is "The first choice"

Explanation:

The circuit switches are used to provide a network that connects among the two parties, which are dedicated for the use to the parties for the length of the connection. It is a familiar technique, that is used to create a network for communication, which is used on telecalls. It also enables the hardware and circuits to share among the users, and for every user, it has direct access to the circuit during the use of the network.

7 0
2 years ago
What is one benefit of using electronic flash cards?
velikii [3]

Answer:

They can be searched using keywords. they may have a different alarm settings. they provide a personal organizer.

Explanation:

Hope this helped Mark BRAINLIEST!!!

4 0
3 years ago
Read 2 more answers
Why does the IPv6 format use letters and numbers?
Iteru [2.4K]

Answer:

c is the response hope it helps

7 0
3 years ago
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • What were the goals of the “paperless society” ideal?
    14·2 answers
  • Which of the following consists of electronic components that store instructions?
    10·1 answer
  • What is text box and label control​
    10·2 answers
  • According to the "multiple-selves" theory, of an online DVD rental service could offer same-day deliveries, so that people who o
    9·1 answer
  • Unemployment can be viewed as
    14·1 answer
  • - What are the different types of clients?
    12·1 answer
  • I need help getting earbuds please help
    11·2 answers
  • Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!