Your friend has asked you to provide one tip for accepting constructive criticism. Which of the following is the best technique? A) Become defensive about the criticism B) Reflect upon the criticism C) Resist seeking solutions to the behavior that prompted the criticism D) Tune out the critic's criticism

Answers

Answer 1

Answer:

b. reflect upon the critisism

Explanation:

i got it right :)

have a great day!

Answer 2

When a friend has asked you to provide one tip for accepting constructive criticism. The best technique is to reflect upon the criticism. The correct option is B.

What is constructive criticism?

Constructive criticism is straightforward, truthful, and simple to apply. It offers concrete illustrations and solutions for effective positive change. This kind of criticism also identifies areas where the recipient can enhance their conduct to reduce potential issues in the future.

Giving feedback in the form of constructive criticism is beneficial since it offers precise, doable recommendations.

Constructive criticism offers specific suggestions on how to make improvements in place of broad counsel. Constructive criticism is direct, to the point, and simple to implement.

Therefore, the correct option is B. Reflect upon the criticism.

To learn more about criticism, refer to the below link:

https://brainly.com/question/8936925

#SPJ5


Related Questions

What type of device is inserted between the computer keyboard connection and usb port for the purposes of stealing information?

a. keylogger

b. rootkit

c. zombie

d. backdoor?

Answers

Answer:

a. keylogger

Explanation:

A keylogger is a device that is inserted between the computer keyboard connection and the USB port to steal information.

The function of this keylogger is to register all the fingering done with the computer keys in order to steal important information such as keys and users of bank accounts and others.

It is also used as a method to spy on conversations and steal valuable information from them.

Software that instructs the computer how to run applications and controls the display/keyboard is known as the /7367008/81dc7fcb?utm_source=registration

Answers

The answer is the alu arithmetic logic unit. (:

A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.

Answers

local






----------------------------------------------------

With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the network.

Answers

Answer:

Wired network connection

Explanation:

A wired network connection uses Ethernet cables to transmit data between different computer devices and connect computers, routers, and switches in a local area network. Wired networks are speedy and reliable with less risk of data packets loss but the upgrading cost of wired networks is more than that of wireless networks.Wired networks can be small in which a single router can connect computers in a network and wired networks can also be large in which many routers and switches are used to connect computers. Wired network the computers are connected to Internet  using T1 line or cable modem.Local Area Network (LAN) is an example of a wired network.

Final answer:

A wired network connection involves computers and devices being physically connected using cables such as coaxial or fiber optic cables. In television, cable programming uses this network to transmit directly to viewers' homes.

Explanation:

With a wired network connection, the computers and other devices on the network are physically connected via cabling to the network. This is in contrast to a wireless network, where devices connect via radio waves. The wired network often uses coaxial or fiber optic cables to transmit data. In the context of television, cable programming is transmitted through these cables from a cable company hub directly to viewers at home, bypassing the need for broadcast transmission towers and local affiliates.

All 50 states have laws that require children, at least to age ______, to be properly secured in safety-tested and approved child safety seats.

Answers

u have to be 80 lbs and 13 years old to ride on the front seat in most states

The term "net radiation" refers to _____ the total amount of energy received by earth. the total amount of energy radiated by earth. the difference in amount of incoming and outgoing radiation. radiation emitted by satellite networks.

Answers


The term "net radiation" refers to the difference in amount of incoming and outgoing radiation the total amount of energy received by earth.

Energy comes from the sunlight penetrates the top of the atmosphere- that's the incoming energy. Then some of it is lost by reflection of clouds or the Earth's surface, thermal radiation- that's the outgoing energy.

Students in the United States are guaranteed a college education. True False

Answers

false should be the answer considering you still have to pay for college.
it is true because in the united students are guaranteed a college education

How many bytes are needed to store: '\n' ?

Answers

One, if the function you are calling/program you are using aren't putting a return in with \n (newline) too, then its two bytes.

Most search sites use a ____, a software program in conjunction with a huge database of information about web pages to help visitors find web pages that contain the information they are seeking.

Answers

Most search sites use a search engine.

A search engine refers to a general class of programs that search and identify items from a huge database of information corresponding to certain keywords or characters specified by the person seeking for a particular information usually from web pages and sites on the World Wide Web. 

Funny or fascinating web content is said to go _________ when it is shared and re-shared a large number of times over a short period.

Answers

it is said to go viral?

Which layer of the osi model provides common representation of the data transferred between application layer services?

Answers

The Session Layer (5).

People without a college education
A. earn on average $2 million less over the course of a lifetime than those who have a college education.

B. are more likely to have high birth-weight babies.

C. earn on average two times less money per year than those who have a college education.

D. make more money over the course of their lifetimes because they enter the workforce earlier.


Answers

im would say c  
hope i helped 

Answer:

C) earn on average two times less money per year than those who have a college education.

Explanation:

A study made by Georgetown University concluded that on average, college graduates earned $1 million more than high school graduates during their total lifetime.  

High school graduates earn on average $30,000 per year while college graduates earn on average between $50,000 to $70,000 per year. Those who achieved a master's, doctorate or professional degree earn the highest amounts.

CLX bit-level instructions require _______ addresses.
A. INT
End of exam
B. BOOL
C. DINT
D. REAL

Answers

CLX bit-level instructions require int addresses. The CLX sructure is an array of zero, one or more. Int is short for integer and in major programming languages, an int is a 32 bit integer. These integers are whole numbers such as zero or one.

A team wants to set up a computer lab for their library. Members would be able to access and read books using the computers in the library. After researching about risks, they decide to install only desktop computers instead of tablets. This strategy might prevent the risk of computers being stolen. Which risk management technique are they following?

A.) risk acceptance
B.) risk mitigation
C.) risk avoidance
D.) risk transfer

Answers

C . Risk avoidance
they don't want anyone to steal their stuff so they get their desktops to avoid anything getting stolen

Which type of attack attempts to overwhelm network links and devices with useless data?

Answers

A DDoS attack is a type of network attack that overwhelms a network with pointless data to the point that normal users can't get access to basic functions. This was notably done to The Playstation Network several years ago.
Final answer:

A Distributed Denial of Service (DDoS) attack attempts to overwhelm network links and devices with useless data.

Explanation:

The type of attack that attempts to overwhelm network links and devices with useless data is called a Distributed Denial of Service (DDoS) attack.

In DDoS attacks, hackers flood a target network or website with an enormous amount of traffic, making it unable to handle legitimate requests. This is achieved by using a network of compromised computers called a botnet to send the malicious traffic.

For example, hackers might use a DDoS attack to target an online shopping website during a busy holiday season, causing the site to slow down or even crash, preventing customers from accessing the site.

In addition to displaying subtotals, the subtotal feature "____" your worksheet so you can control the level of detail that is displayed.

Answers

In addition to displaying subtotals, the subtotal feature "outlines" your worksheet so you can control the level of detail that is displayed. The statement suggests that the displayed details levels are controlled in displaying subtotals in the subtotal feature table.

Mike accidentally wrote a check for more than the balance in his checking account. The bank transferred money from his savings account to his checking account to cover the check. This banking service is _____.

Answers

Transfer. His back transfers money from one account to another.

Answer: The correct answer is overdraft protection.

Explanation: The service that a bank offers when they transfer money from the savings account to a checking account to cover an overdraft is called overdraft protection. Some banks may charge for this service, but others do it for free.

You try to enter your name into a cell that accepts a numeric value. What error would you receive

Answers

A. #NAME

B. #VALUE

C. #REF

D. #####

E. #DIV


#VALUE on plato

your answer is B. #VALUE

6. Which file format is recommended for black and white photographs? Why?

Answers

The file format recommended for black and white photographs is RAW.

The reason for this choice is that RAW format does not process the image, thus, leaving the complete control of the image to the user.
It will offer you great flexibility and a wide variety of options in terms of editing your photograph.

A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
A. 20 A.
B. 15 A.
C. 30 A.
D. 25 A.

Answers

i think it is 25 im not sure though

Answer:

A. 20 A.

Explanation:

The National Electrical Code (NEC) Table 310-16 states that unless there is another specific provision in this code, the overcurrent protection in relation to the conductor types that has an obelisk( ) mark shall not be greater than 15 amps for No. 14, 20 amps for No. 12, and 30 amps for No. 10 copper; or, in relation to aluminum and copper clad aluminum, it shall not be greater than 15 amps for No. 12 and 25 amps for No. 10 after factors for ambient temperature and number of conductors have been adjusted as necessary.

Therefore, a type TW cable containing two No. 12 copper conductors can not have more than 20 A (i.e. 20 amps) overcurrent protection.    

Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what will she need to do?

Sort alphabetically
Sort ascending
Sort descending
Sort numerically

Answers

Sort ascending would be the correct one, since you are going from the lowest value to the highest

The answer is: Sort Ascending

Sort ascending refers to a data arrangement method that is being done through low to high sequence. Some example of sort ascending include things such as showing data from lowest time to highest time, sorting data using initials from A to Z, sorting ranking from 1 - 10th , etc.

You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice that the board has four dimm slots

Answers

The three yellow slots probably indicate triple channeling, which means the board uses DDR3 DIMMs. To know for sure, remove a DIMM and look for the position of the notch on the DIMM.

What wired channel, commonly used for cable tv, consists of an insulated copper wire wrapped in a solid or braided shield placed in an external cover?

Answers

the answer is A coaxial cable

The last host address on the 10.15.25.0/24 network is

Answers

10.15.25.254 or 10.15.25.254/24
Final answer:

The last host address on the 10.15.25.0/24 network is 10.15.25.254. The /24 network provides 256 possible addresses, but the first and last addresses are reserved for network and broadcast addresses respectively.

Explanation:

In a /24 network, the last octet (8 bits) of the IP address is used for identifying hosts. The 10.15.25.0/24 network range offers 256 possible addresses, from 10.15.25.0 to 10.15.25.255. Among these, 10.15.25.0 is the network address and 10.15.25.255 is the broadcast address. Therefore, the last host address - the final usable IP address within this network - is 10.15.25.254.

Learn more about IP Address here:

https://brainly.com/question/35862697

#SPJ6

A touch screen is classified as a special type of scanning device true or false

Answers

The anwser is true. It is special type


A touch screen is a device that can be sued for making scree-related touches and is as it touch sensitive and measures the responses from the touches. It is a type of scanning device that is stylus uses the pressure and is used to make images on the screen.

Hence the option is false as the touch screen is not classified as a true scanner it don't scan and is only a touch-sensitive element.

Hence the option False.

Learn more about the classified as a special type of.

brainly.com/question/19636949.

I plugged my phone up into a charger, the charger sparked and i unplugged my phone and now it wont charge at all, does anyone know what is wrong or how much it would be to fix it?

Answers

The most probable answer is that their was a short on the charger causing your phone's charging port to blow out. You can fix this yourself with a hot air soldering gun to remove the charging port and replace it with an identical port but it is not recommended if you have a warranty. As for prices it depends on the phone.

Which of the following should be considered when conducting an audience analysis ?

Answers

1. Think about it
2. Interview the event organizer
3. Interview audiance members
4. Survey your audience members
5. Poll people similar to your audience.
6. Study past event archives.
7. Review current event materials
8. Make observations at the event itself
9. Make observations during your presentation
hope this helps

Answer:

The intended users prior knowledge of the content at hand

Explanation:

Audience analysis means assessing the audience to make sure that the information provided to them is at the appropriate level and that the audience have the prior knowledge of the content at hand.

The audience are the end-user and all communications need to be targeted towards the audience.

Audience analysis looks at: Socio-demographic traits as sex, age, language, religion and where the audience lives.

Why is the definition for second based on the Cesium 133 atom?

Answers

It is qualitatively defined as the second division of the hour by sixty, the first division by sixty being the minute. The SI definition of second is "the duration of 9 192 631 770 periods of the radiation corresponding to the transition between the two hyperfine levels of the ground state of the caesium 133 atom".

additional rows and columns are inserted into a table by using the _____ tab

Answers

insert tab
up at the top
have a nice day

Answer:

Layout

Explanation:

To add additional rows or columns, click anywhere in the table and click on the layout tab

To add rows ,click insert above or insert below.

To add columns click insert left or insert right.

What function does the domain name system (dns) perform?

Answers

DNS is a distribute database that can return the address of a named machine.
Other Questions
What does the word forebodingly mean in this sentence?The ship creaked forebodingly as the sky darkened.Question 1 options:alertominouslyuneasinessapprehensive Use the timeline below to answer the following question: Which of these events happened last year In the line boogie-woogie rumble/ of a dream deferred from Langston Hughes poem dream boogie what does the term boogie-woogie refer to? Choose the symbol that completes the statement. 6/8 ____ 8/10A: < B: >C: = Which of these lines from sir Gawain and the green knight most clearly exemplifies the medieval ideal of chivalry? A. "I know your worth and price and my debts by no means slight I swear" B. "Know if you were truly is bold is all people so you will grant me gladly the little game that I" C. "Sober and thoughtful he stood there and stroked his beard and with patients like a priest's" D. "And ferociously has red eyes rolled around he lowered his grisly eyebrows glistening green" plot can be broken into several stages: exposition, what , climax,falling action, and conclusion Read the excerpt from How I Live by Nathaniel Hawthorne. I have been busy all day, from early breakfast-time till late in the afternoon. It has been a brisk, breezy day, an effervescent atmosphere, and I have enjoyed it in all its freshness,breathing air which had not been breathed in advance by the hundred thousand pairs of lungs which have common and invisible property in the atmosphere of this great city. My breath had never belonged to anybody but me. It came fresh from the wilderness of ocean. How does Hawthorne most likely feel about city life? Bichitr was a mughal painter whose worker were influenced by art from Early churches were based on the Roman basilica plan. What were the doorways of a basilica plan church collectively called? What is the shortest period in which a population of darwin's finches can evolve? After defeating the Spanish Armada, my country settled along the eastern coast and claimed all territory from Newfouland to Florida for our king. Which of the following best describes me? Spanish settler British settler French settler or Dutch settler N the united states, researchers can conduct a study involving human subjects without telling the participants what risks may be involved. a. True b. False PLEASE HELPPPPPThe expression 60(1+x) represents the total bill including the tip. What do the different parts of the expression represent? Match each expression to the correct description.1) Cost of meal __ 2) Tip percentage __ 3) Number of friends __ a) xb) (1+x)c) 60 Which piece of lab equipment is used to measure the mass of a chemical sample? A)balance B)thermometer C)spring scale Eliminate D)graduated cylinder The 15th amendment granted all men, regardless of race or ethnicity, the right to vote in Which sentences from the text best develop the theme of embracing both traditional and new cultural influences? select each correct answer. "she was american, just as much as she was korean, and even though her mother wouldn't have wanted her to do it, starting the food truck was ji-suk's way of honoring her mother and showing that she valued what her mother had taught her." "he wouldn't have to take violin lessons, nor would he have to learn korean." "she was an avid fan of the kansas city chiefs." "she'd become a lawyer, just like her mother wanted, but she'd also learned to love burnt end barbecue, a local culinary favorite."? As light waves enter the eye, which three structures do they pass through first? True or false: the government could achieve the efficient outcome by giving out fire extinguishers for free using tax revenue. Which of the following events was prompted by Ida Tarbell's investigative journalism? A.)Roosevelt invited Tarbell to dinner at the white house. B.)The Supreme Court broke up the Standard Oil trust. C.)Child labor laws were rewritten. D.) Congress passed a pure food and drug act. What are some consequences of being poor Steam Workshop Downloader