The best way to share criticism is to ______. a. write it in the break room b. talk it about with all your coworkers c. talk about it privately d. discuss it at meetings

Answers

Answer 1

Answer:

C.

Explanation:

Answer 2

Answer:

The correct answer is C. hope this helps

Explanation:

I also got a %100 one the test so its right.


Related Questions

Which system changeover method would you recommend for an air traffic control system upgrade? Explain your answer.

Answers

Answer:

The definition regarding the given concern is outlined in the following part on the clarification.

Explanation:

As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.

What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')

Answers

Answer:

index = 3

Explanation:

the find() function finds the first instance of a letter or word.

'b' = 0

'A' = 1

'n' = 2

'a' = 3

'n' = 4

'a' = 5

the first instance of 'a' in  "bAnana" is found at index location 3 computer scientist start counting from zero.

The index value of "a" in python code is "3".

Program Explanation:

In the given code, a variable "word" is declared that initializes with a string value that is "bAnana".In the next line, an "index" variable is defined that uses a "word" variable with the find method that prints the index value of "a".Using the print method, that prints the "index" value.

Program:

word = 'bAnana' #defining a variable word that initializes with string value

index = word.find('a')#defining a variable index that calls the find method to print index value of a

print(index)#print index value

Output:

Please find the attached file.

Reason for the output:

Since the array of indexing starts with 0 so, the index value of "a" is "3".  

Learn more:

brainly.com/question/13437928

Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.
A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Answers

Answer:

Answer is given in the attached document.

Explanation:

Explanation is given in the attached document.

Answer:

i do not know

Explanation:

Why is the unallocated space of a Windows system so important to a forensic investigator?

Answers

Answer:

Unallocated space can potentially contain all of these types of files and evidence, either completely or partially as fragments, which can remain untouched for long periods of time, even years after the deletion or activity. This data and evidence cannot be viewed by an ordinary computer user, but can be recovered and examined with specialized forensic software and the expertise of a forensic investigator .

Hope this helps :))

if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing

Answers

Answer:

anxiety or depression

Explanation:

Because if you like an device if you get get it you get sad and sad and sadder

In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.

Answers

Answer:

Compliance requirements of moving data and services into the cloud:

In other to use cloud services, one has to comply or follow the rules of the service providers, the country of the location where these services are provided. All these are necessary for the safety of the data stored in the cloud.

Some countries, regions, often set up rules guarding usage and storing data in the cloud. So it is very important to be aware of this. For instance, some countries enforce data localization laws which make data of its citizen stored in the servers of the country. Here, the country has full protection over the data hosted.

There are also data sovereignty laws that give the country hosting the data a sort of authority to exercise in accordance with the law binding cloud data hosting in their region. This gives the country easy access to information in case of any legal means.

So, when choosing a cloud application, it’s important for an organization to select an application that will aid in cloud compliance and improve your security posture, not create more risk.

It is very important to first know which law is applicable to the country one is residing so as to comply with cloud usage to avoid fines and legal cases.

Risks of moving data and services into the cloud

It is good before using cloud services to know who could possibly have access to the data, if it is safe, how long could data be stored.

If there are unauthorized use of cloud services, the organization providing the service might not be aware of the safety of the hosted data which eventually decreases an organization's visibility and control of its network and data.

Data stored in the cloud could become incomplete, stolen, lost.

The client might not be able to control who else has access to the stored data.

Moving data and services into the cloud could become unattractive again as organizations could lose clients and revenue if clients' trust no longer exists.

What is the key function provided by a network

Answers

Answer:

A  key Network Function (NF) of SBA is the Network Repository Function (NRF), which provides NF service registration and discovery, enabling NFs to identify appropriate services in one another.

hope this helps

Explanation:

Other Questions
Which scenarios can be considered effects of Sole Sister Shoe Store choosing to sell dress shoes over sneakers? Select two answers. High school athletes stop shopping there. The inventory of sports socks goes unsold. Publicity for the store declines. Dress shoes cost less for the store to buy from a supplier. A die is thrown . find the probability of (1) a multiple of 2 or 3 in the poem "Barbara Frietchie," which words from the poem show that the day is coming to an end? According to Hookes Law, in order for a spring to apply a restorative force, what must be true about the displacement of the spring? a. The displacement must be proportional to the spring constant b. The displacement must be towards the spring, to compress it and cause it to force back c. The displacement must be measured away from a starting rest position in order to have a force from the spring d. The displacement must be away from the spring, to stretch it and cause it to pull back A negstive and external factor would be which of the following Opportunity WeaknessStrengthThreat AC = 64,AB = 7x + 8, andBC = 3x + 6,Find BC. Good weather and heavy winter rain increases the supply of agricultural products. This means that at any given price, a higher quantity will be supplied. Conversely, a drought would shift the The glutes, quads, hamstrings, and calves are part of your what is the equation linethatis perpendicular to the given line and passes through the point (3,0)? To which political party did Benjamin Harrison belong? (10 points) a Democratic b Republican c Liberal d National A rock is thrown upward with a velocity of 14 meters per second from the top of a 25 meter high cliff, and it misses the cliff on the way back down. When will the rock be 3 meters from ground level? Round your answer to two decimal places. A proposed answer to a scientific problem is a _. *Hypothesis *Experiment *Conclusion *Theory PLS HELP ASAP GUYS! 50 POINTS!! Match the verbal expression to its correct algebraic expression. True or false Fats are usually of animal origin while oils are usually of plant origin To calculate ________ for a PPC campaign, you divide the total budget of the campaign by the number of customers who purchased something from your site. HURRY AND ANSWER Which best explains an effect of the Diaspora on Jewish people? They did not keep their religious identity. They used traditions to help them identify as a community. They did not develop a sense of shared history. They transitioned to a new religious identity. 11. An AC waveform has a peak voltage of 50 VAC. What's thewaveform's RMS voltage?O A. 50.0 VACB. 35.4 VACC. 24.8 VACO D.52.8 VAC The function h(x) = 12x8 + 49 is an even function. Which transformation of h(x) would result in a function that is neither even nor odd? reflection over the x-axis vertical stretch by a factor of 7 translation 8 units to the right horizontal compression by a factor ofOne-half HELP!! Thank you so much if you do Point A (2, 6) has been translated 1 left and 3 up followed by a 180 degree rotation.What is the image of Point A?