What is constructive criticism?
а
Advice and possible solutions intended to help or improve something
Information given to others as a way to make them feel unintelligent
b
Reports about decreasing profits
d
Statements and no possible solutions aimed at showing problem areas

Answers

Answer 1

Answer:

a. Advice and possible solutions intended to help or improve something

Explanation:

The answer is a because constructive criticism is when you help someone do/get better at something, through positivity.


Related Questions

What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^

Answers

Answer:

Serial Advanced Technology Attachment (SATA).

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.

Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.

Generally, SATA comprises of two ports and these are the power and data connector.

What do you do when you have computer problems? Check all that apply. PLEASE HELP

Answers

Answer:

I ask my parents or call someone

Can you put the answers to the problem it would be a lot easier for me


And I would look up how to fix the problem on my own before paying someone....

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

Your aunt owns a store and hired you to analyze the customers. You recorded the estimated ages of customers who shopped in the store and whether they made a purchase. Some of your data values are followed. What types of analysis could you do with this data? Select 4 options.

Your aunt owns a store and hired you to analyze the customers. You recorded the estimated ages of customers

Answers

Answer:

-percentage of customers who made a purchase

-minimum age

-average age

-maximum age

Percentage of customers who made a purchase, minimum age, average age and maximum age are the types of analysis could you do with this data. Hence, option A, B, C and E are correct.

What is data values?

A data value is the material that fills the space of a record. For instance, one of the database's numerous data fields might contain a number that indicates the weight of a certain integer.

Data, such as statistics, phone numbers, or inventory counts, are undoubtedly pieces of information that a person would understand as numbers.

Data provides useful information that enhances business decisions. This information is the result of an effective data analytics strategy. Businesses may create a data culture far more easily because of the monetary worth of data.

Thus, option A, B, C and E are correct.

For more information about data values, click here:

https://brainly.com/question/16612044

#SPJ2

Which word should a programmer use to describe what should happen when the condition of an if statement is NOT met?

A.
iterative

B.
when

C.
else

D.
also

Answers

The word  that should a programmer use to describe what should happen when the condition of an if statement is NOT met is option C. else.

Why are conditional statements used in programming?

When a condition is true or false, a conditional statement instructs a program to take a certain action. If-then or if-then-else statements are frequently used to represent it. The preceding example is a block of code that employs a "if/then" conditional statement.

Therefore, the else statement is used, "to indicate what should happen when the condition of an if statement is not fulfilled," is the proper response since the otherwise statement is typically used when computations are still necessary when a condition in an if and else-if statement is not met.

Learn more about programmer from

https://brainly.com/question/22654163

#SPJ1

A small software company is starting to work with the AWS Cloud. Which service will allow them to find, test, buy, and deploy software that runs on AWS

Answers

Answer:

Elastic Beanstalk

Explanation:

Elastic Beanstalk: AWS Elastic Beanstalk is an easy-to-use service for deploying and scaling web applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS.

which air carrier personnel are required to carry an faa airman certificate on his/ her person when performing the tasks which require the certificate?

Answers

Technicians, dispatchers, and cockpit crew. a person knowledgeable in a particular technical discipline or in mechanical or industrial processes. a person employed to perform practical work in a laboratory, technical school, or scientific facility.

A technician is an employee in the technology industry who possesses the necessary ability and technique as well as a practical comprehension of the theoretical underpinnings. Technicians are knowledgeable workers who are found in practically every field. Different systems and pieces of equipment are repaired, installed, replaced, and serviced. Technicians should be able to comprehend instructions and speak well because they frequently collaborate with other skilled individuals. Engineers are in charge of planning and implementing projects, whereas technicians are the "doers" and have the duty of finishing projects. Engineers must be able to recognize problems and come up with ways to repair them, whereas technicians only need to implement the solutions.

Learn more about Technicians here

https://brainly.com/question/7199470

#SPJ4

Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contains technical language. It is reviewed by competitors.

Answers

Answer:

It is based on research

Explanation:

An effective problem statement is a term often used in research operation to describe a statement that practically deals with the current issue that needs to be solved, situations or circumstances that require enhancement, or a drawback that must be solved, which demands critical insight and conscious analysis.

There are various characteristics of Effective problem statement, some of which are:

1. It should focus on the need for solving the problem

2. The ways in which the problem will be solved should be stated in a precise and concise manner

3. It should be based on the main objective of the statement.

Hence, in this case, the correct answer is "It is based on research."

Answer:

A

Explanation:

Correct on Edge 2021:)

Your welcome

vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. which factor is least likely to impact wireless signals?

Answers

Since Vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. the factor that is least likely to impact wireless signals is Time of day

How do wireless signals work?

Electromagnetic waves that are traveling through the atmosphere are wireless signals. These are created when electric energy passes through a metal object, such a wire or an antenna, and waves are created all around that object.

In summary, the manipulation of radio waves enables the wireless transport of data. These waves are produced by creating electrical pulses in a natural way. Then, in order to transmit sound or data, these radio waves might have their amplitude or frequency altered.

Learn more about wireless signals from

https://brainly.com/question/23091703
#SPJ1

the file's _______________ indicates what type of program uses the data by looking at the _______________.

Answers

By examining the suffix, the file's association reveals what kind of software utilises the data.

How would you define a program?

A word that counts. A computer uses a collection of directions called a program to carry out a specific job. The size of a computer software affects the likelihood that a mistake will arise.

What are instances of a program?

A program is a noun that refers to a collection of instructions that handle input, manipulate the data, and produce a result. It is also referred to as an application or software. As an illustration, the word writing tool Microsoft Word enables users to make and compose documents.

To know more about Program visit:

https://brainly.com/question/23275071

#SPJ4

11.
Mona is confused about finite loop and infinite loop, explain her with the help of
example.

Answers

Answer:

The basic difference between finite and infinite is the number of times it runs and ends. The loop is basically a set of instructions that keeps repeating itself.

The finite loop ends after running for a finite times. This body of finite loop will stop executing after certain condition is reached. Hence the finite loop body keeps executing itself finite number of times.

An infinite loop keeps running and repeating itself endlessly.This loop never ends. This loop can be the result of an error in a program. For example when no stopping or exit condition is specified in the program.

Explanation:

Example of finite loop:

Lets take for loop as an example:

for(int i =0; i<=5; i++)

{ cout<<i<<endl; }

Now the loop starts from i=0

Next it enters the body of loop to execute the statement: cout<<i; which means that the value of i is displayed on the output screen.

This loop keeps executing until the value of i exceeds 5.

At first iteration 0 is printed on the output screen, at second iteration 1, at third iteration 2, at fourth iteration 3, fifth iteration 4, sixth iteration 5. After each of these iterations, the value of i is incremented by 1.

When 5 is printed, then at the next iteration the specified condition i.e. i<=5 gets false as the value of i now becomes 6 after incremented by 1.

So the loop stops running. So this means that loop ran for finite times and stopped after the a certain condition is reached. The output is:

0

1

2

3

4

5

Example of infinite loop:

Lets take while loop:

int i = 6;

    while (i >=5)

    {         cout<< i;

             i++;     }

In the above example, the loop will run infinite times. Here the value of i is initialized to 6. Then while loop is used which checks the condition which is the value of i is greater than or equal to 5. If the condition is true, the body of the loop starts executing which prints the value of i. Lets see what happens at each iteration:

1st iteration: i>=5 is True because i=6 and 6 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 6. Next the value of i is incremented by 1 and it becomes 7.

2nd iteration: i>=5 is True because i=7 and 7 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 7. Next the value of i is incremented by 1 and it becomes 8.

This loop will repeat itself infinite times and never stops as i will always have value greater than 5. So this is the example of infinite loop.

When a condition constantly evaluates to true, the loop control does not travel outside of that loop, resulting in an infinite loop.

Infinite loop and example:

When a condition never turns false, the program enters a loop, which keeps repeating the same block of code over and over, with no end in sight.

An endless loop is demonstrated in the following example: b = input("what's your name?") while a==1 ", Welcome to Intellipaat!" print("Hi", b, ",

Find out more information about 'Loop'.

https://brainly.com/question/2081668?referrer=searchResults

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

True/False : "using namespace" in C++ is most similar to what keyword in Java

Answers

The "using namespace" directive in C++ is used to bring all the names in a namespace into the current scope, there is no exact equivalent keyword in Java. False.

In Java, packages are used to organize related classes and interfaces, and each package has a unique name.

To use a class or interface from a package, the package name must be included in the code, and this is done using the "import" keyword.

The "import" keyword is used to import a specific class or interface from a package into the current class, but it does not bring all the names in the package into the current scope.

So both "using namespace" in C++ and "import" in Java are used to bring external names into the current scope, they work in different ways and have different syntax.

In Java, similar classes and interfaces are grouped into packages, each of which has a distinct name.

The "import" keyword is used to add the package name in the code in order to utilise a class or interface from a package.

A single class or interface from a package can be imported into the current class using the "import" keyword, but not all of the names in the package are brought into the current scope.

Since they both work differently and have different syntax, "using namespace" in C++ and "import" in Java are used to bring external names into the current scope.

For similar questions on Using namespace

https://brainly.com/question/14278245

#SPJ11

android and ios both offer a quick swipe to get to some basic settings such as those that allow you to turn on bluetooth and adjust brightness. what are these tools called?

Answers

These are referred to as "fast settings." Users may rapidly access commonly used settings like Wi-Fi, Bluetooth, brightness, and other device settings with the help of a set of toggles called fast settings.

They are referred to as "quick settings." With the use of a series of toggles referred to as fast settings, users may quickly access frequently used settings including Wi-Fi, Bluetooth, brightness, and other device settings. On both iOS and Android smartphones, you may access them by swiping downward from the top of the screen. When opposed to scrolling through menus to locate the same options, quick settings give quick access to crucial operations. The fast settings panel may be modified by the user by choosing which toggles to include and in what order they appear. By swiping left or right on the fast settings panel, users of some devices can access additional quick settings choices.

learn more about Bluetooth here:

https://brainly.com/question/13072419

#SPJ4

JAVA.
plzzz help

..............​

JAVA. plzzz help..............

Answers

Solution file is attached here.

a. (True/False) The signal() call of pthread condition variables require two parameters: one for the condition variable object and one for a mutex object. What is the b. Part of what happens when a thread calls wait() is that the thread is put on a waiting list and the mutex object provided in the call is released. state of the mutex object when wait() returns? a) it is in the locked state, or b) it is in the unlocked state c. What happens if signal) on a condition variable that has no threads in its waiting list? a) signal() has no effect, b) signal() waits until a thread joins the waiting list, c) signal() returns right away, but then the next thread that calls wait() does not have to wait. d. What is a spurious wakeup"? Is it a) when a call to wait) returns even though no call to signal() has occurred, b) a wakeup that is spurred by a pthread_cond_broadcast) call, or c) the situation in which multiple wait() calls return because of a single signal() cal.

Answers

the signal() call of pthread condition variables requires two parameters, the mutex object is in the unlocked state when wait() returns, signal() has no effect if no threads are waiting, and a spurious wakeup is when wait() returns without a signal().

a. The signal() call of pthread condition variables require two parameters: one for the condition variable object and one for a mutex object is True.

b. The mutex object provided in the call is in the locked state when wait() returns.

c. a) signal() has no effect. If there are no threads waiting on the condition variable, then calling signal() has no effect. The thread that made the signal() call proceeds, but no waiting thread is woken up.

d. A spurious wakeup is when a call to wait() returns even though no call to signal() has occurred. It is the situation in which multiple wait() calls return because of a single signal() call. Therefore, the answer is (a) when a call to wait() returns even though no call to signal() has occurred.

Learn more about pthread: brainly.com/question/27851826

#SPJ11

Which code is easier to learn, Python or C++. And which one is better than the other in your opinion

Answers

Okay so I’m terms of easiest to learn it depends on the person for me it is Python and python is better because it can be used for lots of purposes

What technology solution blocks inbound access to internal sites, has anti-virus, and intrusion detection?

Answers

The technology solution that blocks inbound access to internal sites, incorporates anti-virus capabilities, and intrusion detection is a firewall system. A firewall system is a network security solution that controls and filters network traffic based on predefined rules and policies.

A firewall system is a technology solution that plays a critical role in network security. It acts as a barrier between an internal network and the external network, controlling inbound and outbound traffic based on a set of predefined rules. One of the primary functions of a firewall is to block unauthorized inbound access to internal sites or resources, protecting them from external threats. In addition to its access control capabilities, a firewall system often incorporates anti-virus capabilities. It can perform real-time scanning and filtering of network traffic to detect and prevent the spread of viruses, malware, or other malicious software.

Learn more about firewall system here:

https://brainly.com/question/10604240

#SPJ11

Job opportunities in the computer science field are expected to (5 points)
A. increase
B. stay the same
C. decrease
D. be limited

Answers

Answer:

A) increase

Explanation:

Computer science is a high-demand job and is one of the crucial components needed to run future technology.

Answer:

(C) decrease

Explanation:

Because Artificial intelligence is coming ♕︎ first increase for few years but when it dec decrease then never will increase again.

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction?

Answers

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction is option c. Add M[4], M[5], M[6].

What is high-level program referred to as?

High-level languages are set up to act or be close to be used by the human operator or any kind of programmer.

Note that they are seen to as "closer to humans." based on the fact that their context is easier to know and implement  and as such, The high-level program instruction a = b + c is most likely to be translated to which assembly instruction is option c. Add M[4], M[5], M[6].

Learn more about high-level program from

https://brainly.com/question/22695199

#SPJ1

See full question below

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction?

a. Add M[4]

b. Add M[4], M[5]

c. Add M[4], M[5], M[6]

d. Add M[4], M[5], M[6], M[7]

When is a for loop used in a Java Program?

A. When you already know how many times to perform an action.
B. When you want to test how many times to perform an action.
C. When you don't know how many times to perform an action.
D. When you want to define the name of an action.

Answers

Answer:

A

Explanation

Use "for loop" when size/length is pre-defined/know, such as

int[] numbers = new int[]{ 1,2,3,4,5,6,7,8,9,10 };

length : 10

snippet:

numbers.forEach(int num in numbers){

}

// or

for(int i=0; i < numbers.length ; i++){

}

question 1
Please summarize into 2 pages only ?
-----------
LAN Security Attacks Common LAN Attacks
. Common security solutions using routers, firewalls, Intrusion
Prevention System (IPSS), and VPN de

Answers

In a LAN (Local Area Network) setup, there are a variety of common security vulnerabilities that can be exploited by attackers. Some of the common attacks that can be made on LANs are listed below:

1. ARP (Address Resolution Protocol) Spoofing - ARP Spoofing is when a hacker modifies the ARP cache of the system in order to redirect traffic to the attacker's device.

2. MAC Spoofing - The attacker spoofs the MAC address of the network interface controller (NIC) in order to obtain unauthorized access to the network.

3. Rogue DHCP Servers - An attacker creates a rogue DHCP server on the network to distribute IP addresses to clients, potentially allowing the attacker to monitor network traffic.

4. DNS Spoofing - The attacker creates a fake DNS server in order to redirect traffic to a malicious website.

5. Port Scanning - The attacker scans the network for open ports in order to identify potential vulnerabilities.

Security solutions that can be implemented in LANs include:

1. Routers - Routers can be configured to block incoming traffic and prevent access to untrusted devices.

2. Firewalls - Firewalls are used to prevent unauthorized access to the network by blocking traffic based on predefined rules.

3. Intrusion Prevention System (IPS) - IPS systems can be used to monitor network traffic and identify and prevent attacks.

4. VPN - A VPN (Virtual Private Network) can be used to secure network traffic by encrypting it as it is transmitted over the internet.

Know more about Local Area Network, here:

https://brainly.com/question/13267115

#SPJ11

a layer 2 ethernet switch constructs a mac address table. what information is contained in this table?

Answers

O Each frame has a TCP and/or UDP port number. IP addresses are mapped to the ports from whence they were learned in this diagram. O a mapping of MAC addresses to the ports they were coming from O IP route entries learned via routing protocols (for example, OSPF).

What si TCP?Application software and computing devices can exchange messages over a network thanks to the Transmission Control Protocol (TCP) standard for communications. It is made to transmit packets across the internet and guarantee the successful transmission of data and messages through networks. Numerous internet applications, including as the World Wide Web (WWW), email, File Transfer Protocol, Secure Shell, peer-to-peer file sharing, and streaming video, heavily rely on TCP.Two different computer network protocols, TCP and IP, exist. The component of IP that determines the address to which data is transmitted. Once the IP address has been located, TCP is in charge of data delivery.

To learn more about TCP, refer to:

https://brainly.com/question/14280351

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

Sean is offered a job in New York City earning $120,000 a year, and a job in Salt Lake City earning $100,000 a year. What financial factor should he consider when determining which job to accept?

Answers

Answer:

Determine the travelling expenses first.

Explanation:

Since it is in two different places, the travelling costs would be different. This would create a big difference and is a factor to consider.

The  financial factor that he considers is that he will have more spending power if he stays in this City.

What is spending power?

The consumer purchasing power is known to be the length to which a consumer can spend money.

Note that based on the above scenario, The  financial factor that he considers is that He will have more spending power if Sean stays in this City.

Learn more about  financial factor  from

https://brainly.com/question/26504247

#SPJ2

who like the videos where is clown is from :)

who like the videos where is clown is from :)

Answers

Answer:

i hate clowns alot especially pennywise lol

Explanation:

when you hear the word "automation" what comes to mind?

Answers

Answer:

The act of operation without direct control by a person.

Explanation:

The encyclopedia describes automation as “the procedure of producing an equipment, a method, or an arrangement function automatically.” We describe automation as "the formulation and utilization of technology to observe and regulate the reproduction and distribution of products and assistance.” to the society.

What members of a base class can be redefined in the derived classes? o public members o private members O final members o virtual members

Answers

In derived classes, the public members of a base class can be redefined.

What are the public members of a base class?

The public members of the base class are the members that can be accessed and modified directly from the derived class. The derived class can override these members' functionality by redefining them with the same name and signature but with different implementation logic.

The private members of a base class cannot be redefined in the derived class. Private members are only available within the base class. In C++, access to these members is denied in the derived class, so they cannot be overridden

A similar idea applies to final members, which cannot be overridden by definition.Virtual members of a base class can be overridden in the derived classes.

The virtual keyword is added before the member function's signature in the base class to specify that it is virtual. A virtual member function's definition can be changed in the derived class to provide different functionality while preserving the same signature.

Learn more about derived class at

https://brainly.com/question/31964070

#SPJ11

During this era page numbers were developed as information was growing and written communication needed more effective systems for blank

Answers

Answer:

Sorting and organizing

Explanation:

During this era page numbers were developed as information was growing and written communication needed

During the sorting  and organizing era, page numbers were developed as information was growing.

What is sorting and organizing?

The verb sorting is known to be a term that connote the act of separating out things or items based on some criteria.

The term organize is known to be a term that connote the act of putting or working order. Here people organize things in order for them to be able to remember or for ease of work. In  the sorting  and organizing time, page numbers was created as information was increasing.

Learn more about sorting from

https://brainly.com/question/2345433

How many comparisons will be made to find 8 in this list using a linear search?

1, 8, 15, 12, 16, 3, 8, 10


1

2

4

3

Answers

Answer:

4

Explanation:

4

Other Questions
it has been estimated that williams college saves gallons of water annually by eliminating cafeteria trays at one dining hall. What are 3 things banks do? 1.what PROCESS describes the water moving through a membrane?2.water flows across a cell membrane from where it is- Which of the following examples is the best way of describing the essential element of geography called places and regions?A.understanding the cultures that humans createB.learning about how the environment affects humansC.studying what places are like and why they are grouped togetherD.seeing why things are located in different placesPlease select the best answer from the choices providedABCD The antifederalists argued that the powers of government should be limited by. En la oracin 1 del prrafo 4, por qu ana dice "cuando cre que deba terminar la reunin"?. Think about the authors claims about Marco Polo in the text Did Marco Polo Really Go to China? from A Story of Ambition in 50 Hoaxes and your chosen source. Consider fairness, evidence, logic, and tone as you evaluate both arguments. Write a short commentary comparing how both authors support their claims and which author did a better job. Be sure to offer evidence to support your thinking. $2000 are invested in a bank account at an interest rate of 5 percent per year.Find the amount in the bank after 7 years if interest is compounded annually. Find the amount in the bank after 7 years if interest is compounded quaterly. Find the amount in the bank after 7 years if interest is compounded monthly. Finally, find the amount in the bank after 7 years if interest is compounded continuously. find the area of the shaded sector of the circle explain howproteins are targeted for degradation, and give a specific example of when this might occur Over the summer, Paulo opens a dog-washing business and begins with $32. The table shows how much he earns and spends each week. He works for 8 weeks washing dogs. When he starts back at school, he budgets $60 to spend each week. How many weeks pass before he needs to wash more dogs? Write a single statement that prints a number at random from each of the following sets: a) 2,4,6,8,10. b) 3,5,7,9,11. c) 6, 10, 14, 18, 22. BE YOU. YOU ARE LOVED. YOU ARE AWESOME."If you don't design your own life plan, chances are you'll fall into someone else's plan. And guess what they have planned for you? Not much." -Jim Rohn Which of the following is NOT a dimension of the SERVQUAL a.k.aRATER model?Group of answer choicesReinforcementResponsivenessReliabilityEmpathyAssurance Compare the tourism industry between Thailand and Malaysia. What are the main differences. Please provide me with a detailed explanation. (market structure)Both Thailand tourism and Malaysian tourism operate under an oligopoly market structure: the main features are :1. It is ruled by few firms2. They are price makers3. They dont allow others to penetrate4. They compete on the basis of price; quantity or anyoneDetailed explanation Please resting state? Writing Describe a dream. Imagine you are arriving at a beautiful destination. In one paragraph describe who or what you see and what is happening in your dream. 4. How many times will the print statement be executed within the following nested for loops? Briefly explain how or show the math to calculate that number of iterations.for (int h = 1; h Simplify -n x 8 x n please help why are there usually more producers than primary consumers in a food chain? "what is the definition of 'basal transcription' in e. coli and other bacteria?"