Describe the five steps of the process of assessing personal strengths and weaknesses

Answers

Answer 1
•Ask others for input. ...
•Revisit past feedback. ...
•“Hire” yourself. ...
•Revisit your strength list.

Related Questions

Language: JAVA Can someone please tell me what the problem to my "main" class is?

I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.

Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris

Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468

Answers

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

Which is true regarding pseudocode?
O It uses simple words and symbols to communicate the design of a program.
O It compiles and executes code.
O It expresses only complex processes.
O It gives a graphical representation of a set of instructions to solve a problem.

Answers

Answer:

The answer is A it uses simple words and symbols to communicate the design of a program.

Explanation:

Science Stuff

The true regarding pseudocode is it uses simple words and symbols to communicate the design of a program. The correct option is a.

What is pseudocode?

Pseudocode is a simple language description of an algorithm or other system's processes used in computer science. Although pseudocode frequently employs standard programming language structure rules, it is written for humans rather than automated comprehension.

In the field of computer science, a pseudocode is a linguistic description of an algorithm's steps. They consist of text-based components and are simple. Informally expressing concepts and techniques during the development process is known as pseudocoding.

Therefore, the correct option is a, It uses simple words and symbols to communicate the design of a program.

To learn more about pseudocode, refer to the link:

https://brainly.com/question/17442954

#SPJ6

What is one way in which media provides entertainment?
A. With stock options
B. With information
C. With career networks
D. With videos and games
(I will give brainlist!!!!!)

Answers

D. with videos and games
Its Option D - With Videos and Games, of course.
Thank you!


Ethernet network.  Your job is to decode it and answer the below questions. 
SEARCH:  Hex to ASCII converter
Copy the code below and paste into the Hex Code section.
Copy the converted code and paste underneath where it says <Insert>
d4 a9 28 06 f0 43 50 7b 9d e4 db e1 08 00 45 00
03 2f 4b 9d 40 00 80 06 62 cc c0 a8 01 bb 83 f7
03 05 de 92 00 50 62 72 96 9e c8 61 7b 5f 50 18
01 00 c9 cf 00 00 47 45 54 20 2f 7e 6b 63 68 72
69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68 74
6d 6c 20 48 54 54 50 2f 31 2e 31 0d 0a 48 6f 73
74 3a 20 77 77 77 2e 63 73 65 65 2e 75 73 66 2e
65 64 75 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a
20 6b 65 65 70 2d 61 6c 69 76 65 0d 0a 43 61 63
68 65 2d 43 6f 6e 74 72 6f 6c 3a 20 6d 61 78 2d
61 67 65 3d 30 0d 0a 55 70 67 72 61 64 65 2d 49
6e 73 65 63 75 72 65 2d 52 65 71 75 65 73 74 73
3a 20 31 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a
20 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 
6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57
69 6e 36 34 3b 20 78 36 34 29 20 41 70 70 6c 65
57 65 62 4b 69 74 2f 35 33 37 2e 33 36 20 28 4b
48 54 4d 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f
29 20 43 68 72 6f 6d 65 2f 36 38 2e 30 2e 33 34
34 30 2e 31 30 36 20 53 61 66 61 72 69 2f 35 33
37 2e 33 36 0d 0a 41 63 63 65 70 74 3a 20 74 65
78 74 2f 68 74 6d 6c 2c 61 70 70 6c 69 63 61 74
69 6f 6e 2f 78 68 74 6d 6c 2b 78 6d 6c 2c 61 70

70 6c 69 63 61 74 69 6f 6e 2f 78 6d 6c 3b 71 3d
30 2e 39 2c 69 6d 61 67 65 2f 77 65 62 70 2c 69
6d 61 67 65 2f 61 70 6e 67 2c 2a 2f 2a 3b 71 3d
30 2e 38 0d 0a 41 63 63 65 70 74 2d 45 6e 63 6f
64 69 6e 67 3a 20 67 7a 69 70 2c 20 64 65 66 6c
61 74 65 0d 0a 41 63 63 65 70 74 2d 4c 61 6e 67
75 61 67 65 3a 20 65 6e 2d 55 53 2c 65 6e 3b 71
3d 30 2e 39 0d 0a 43 6f 6f 6b 69 65 3a 20 5f 5f
75 74 6d 61 3d 31 31 38 36 31 39 32 37 37 2e 31
37 34 32 37 37 36 38 33 30 2e 31 35 33 34 36 34
34 39 36 33 2e 31 35 33 34 36 34 34 39 36 33 2e
31 35 33 34 36 38 38 34 35 35 2e 32 3b 20 5f 5f
75 74 6d 7a 3d 31 31 38 36 31 39 32 37 37 2e 31
35 33 34 36 38 38 34 35 35 2e 32 2e 32 2e 75 74
6d 63 73 72 3d 63 73 65 65 2e 75 73 66 2e 65 64
75 7c 75 74 6d 63 63 6e 3d 28 72 65 66 65 72 72
61 6c 29 7c 75 74 6d 63 6d 64 3d 72 65 66 65 72
72 61 6c 7c 75 74 6d 63 63 74 3d 2f 7e 6b 63 68
72 69 73 74 65 2f 63 68 72 69 73 74 65 6e 2e 68
74 6d 6c 3b 20 5f 5f 75 74 6d 74 3d 31 3b 20 5f
5f 75 74 6d 74 5f 61 63 63 6f 75 6e 74 32 3d 31
3b 20 5f 5f 75 74 6d 62 3d 31 31 38 36 31 39 32
37 37 2e 34 2e 31 30 2e 31 35 33 34 36 38 38 34
35 35 0d 0a 49 66 2d 4e 6f 6e 65 2d 4d 61 74 63
68 3a 20 22 31 37 61 39 2d 35 37 33 35 34 61 35
33 39 30 31 33 65 22 0d 0a 49 66 2d 4d 6f 64 69
66 69 65 64 2d 53 69 6e 63 65 3a 20 4d 6f 6e 2c
20 31 33 20 41 75 67 20 32 30 31 38 20 31 37 3a
34 34 3a 32 39 20 47 4d 54 0d 0a 0d 0a 

<INSERT>
a) What is the Ethernet destination and source address (in hex)? 
b) Identify the vendor of the equipment of the source?
c) What is the protocol type (in the Ethernet header)? 
d) What version of IP is this? 
e) What are the IP destination and source addresses (give in proper dotted decimal notation)? 
f) Identify if the transport protocol is TCP or UDP.
g) What are the transport protocol destination and source port numbers (in decimal)? 
h) What is the application protocol (be sure to give the version number)? 
i) What is the function being performed at the application layer (that is, what is the purpose of
this packet)? 
j) What are the checksum values for all protocols that have a checksum in this packet? Note
that a CRC is not a checksum.

Answers

ang gulo po pede po ba pa picture thank you po.

How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my grades up, I help around the house, I am in honors classes, I help my siblings out with school, I help make dinner, I just help a lot. What should I do?

Answers

Answer:

my explanation is above my comment :)

Explanation:

Why does a business need to use effective strategies to find a solution for a problem?
- to thoroughly understand the problem
-to find several solutions to a problem
-to properly diagram the flow of information to solve the problem
- to find a solution that cannot be replicated​

Answers

Answer:

to properly diagram the flow of information to solve the problem

Explanation: 99% sure this is it

A business needs to use effective strategies to find a solution for a problem for several reasons. First, using effective strategies can help the business thoroughly understand the problem they are trying to solve.

What is business?

Business refers to an organization or an individual engaged in commercial, industrial, or professional activities with the aim of generating profit.

A business typically involves buying or producing goods or services and selling them for a profit to consumers or other businesses.

For a number of reasons, a firm has to adopt efficient methods to resolve a problem. First, employing successful tactics can aid a company in fully comprehending the issue at hand, as well as its underlying causes, potential effects, and potential solutions.

This may result in more focused and successful attempts to solve problems.

Second, excellent tactics can assist the company in locating and assessing a number of potential fixes for the issue, enabling them to select the ideal course of action in light of their particular requirements and circumstances.

Thus, finding a solution that can be replicated is often desirable, as it can help the business avoid similar problems in the future and streamline their operations.

For more details regarding business, visit:

https://brainly.com/question/15826604

#SPJ2

Which of the following are characteristics of the Boolean data type? Check all that apply
It holds infinite values.
It uses operators such as AND, OR, and NOT
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Help I’m timed !!

Answers

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation: Just did it on edg

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation:

Got it correct on edge

What statement best describes operating systems?

Answers

Answer:

An operating system, or "OS," is software that communicates with the hardware and allows other programs to run

Is a softer and a electric Inc. thing

Why can't mechanical switches be used in microprocessors

Answers

Answer:

Microprocessor sometimes called the central processing unit.

Explanation:

Microprocessor is the heart of the computer network. It is useful in large agencies such as business, government, and our lives. This little chip is called the life of the computer. It is also called all computers life as we all know that. It is formed as the purest form of Moore law. It also said that this little chip also reached to its physical form.

The microprocessor sometimes called central processing unit or CPU. Mechanical switches are not used in microprocessor because of their easily interference. It has common problem called contact bounce.

Which correctly lists the two elements that make up the empty space in the universe? ice and debris debris and dark matter dark matter and dark energy dark energy and dust

Answers

Answer:

The answer is "dark matter and dark energy and dust".

Explanation:

In the empty room, the universe is gases and ashes. Even though humans think the exterior universe's blank space is nothing more than empty.  Fortunately, the plasma form of its hydrogen and helium gases, including the various types of dirt and debris, occupy this void vacuum.  There are also several other materials however these greenhouse gases and dust particles are also the bulk of the material.

Answer:

c

Explanation:

Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance

Answers

Answer:

Mentor Programs

Explanation:

This is because it is talking about different ages which is a mentor type thing

Answer: mentoring programs

Explanation:

A p e x

Hi, I just have a few questions from my digital tech assignment.

1. ___ domain indicates that the computer or DNS name does not exist.

2. Why are users able to log on to any computer in a domain?

A. because they do not need an account for each computer
B. because all computers act as workstations and servers
C. because they can reconfigure or update hardware without turning off the system
D. because networks use names to make accessing nodes easier

3. Describe, step by step, how to create an account for a computer on the domain controller.

Answers

Answer:

b

Explanation:

i took the test my self

Answer:

for number one you put system in the blank

Explanation:

Using the Internet comes with certain risks that you should be prepared for. True False​

Answers

True true and true u can get catfished or be talking to a 78 y/o man like me am I a person or a old piece of hag

When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the processes listed below?

Answers

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

15. The legal right to control the
production and selling of a book, play,
film and software is known as
A. Production right
B. Copyright
C. Trade mark
D. Patent​

Answers

the correct answer copyright

Answer:

I believe the answer is copyright

Explanation:

Different between minicomputer and microcomputer​

Answers

Answer:

Microcomputers usually refer to laptop or desktop PCs that you use in a typical household, whereas minicomputers, which were primarily used from 1960 to 1980, are generally larger, but have limited functionality and slower processors.

Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
computer algorithm helps Mrs. Patel?

It gives judgments about how Mrs. Patel spends her money.

It makes Mrs. Patel modern.

It reduces errors.

It shows how to write checks.

Answers

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

Answer:

c

Explanation:

10 points
What is wrong with the following code:
(don't say syntax error, what is the wrong)
>>> print 'Hello world!'
File " primt 'Hello world!'
SyntaxError: invalid syntax

Answers

Answer:

Primt

Explanation:

List inputs to a technological system

Answers

The seven inputs to a technological system are people, materials, tools and machines, energy, information, finances, and time.

WILL GIVE BRAINLIEST!!!!!!!!
Trade-offs are the moral principles and values that guide conduct within a group of people.


Group of answer choices


True


False

Answers

yes trueso true true true

Which statement most accurately differentiates between engineers and scientists? Engineers are in constant search of more knowledge and research; scientists are always driven to solve problems using technical innovations. Engineers explore theoretical solutions; scientists apply practical knowledge to all situations. Engineers explore basic human needs; scientists do not need to know about basic human needs. Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.

Answers

Answer: Engineers engage in real-world scenarios; scientists work with abstract or theoretical knowledge to solve problems.

Explanation:

Answer:

c

Explanation:

What is the main purpose of broadcasting via satellite? A. To enable signal reception at night B. To convert analog signals to digital signals C. To enable signal reception over a wider area D. To strengthen and improve the quality of the signal

Answers

Answer:

The answer is "Option C".

Explanation:

Satellite transmission is a content distribution program, that utilizes digital signals to transmit from satellites that receive parabolic antennas widely known as satellite dishes. It's a  low noise block generator for transmitted to cooling. It also allows the user it accepts single in a wide area, and the wrong choice can be defined as follows:

In choice a, It allows the uses to receive a signal at all times, that's why it is wrong. In choice b, It provides digital signals,  that's why it is wrong. In choice d, It is wrong because it always provides quality signals.  

 

Hi everyone! I was wondering if any of you want to help me with a computer science problem I have for one of my classes. I do not understand how to do it which is why I ask.

Here is the problem: Write an algorithm for placing a set of pencils in order from largest to smallest (left to right).

I learned other sorting algorithms but I don't quite understand how to implement them into my own algorithm.

Thanks.

Answers

Answer:

Use bubble sorting

Here is an example program I made:

for(int i = 0; i < length; i++){

     for(int j = 0; j < length; j++){

       if(j != length - 1){

         if(input[j] > input[j + 1]){

          storeVar = input[j];

         

          input[j] = input[j+1]; //storeVar2;

         

          input[j+1] = storeVar;

         }

       }

     }

Which features can Danica use to fix the issue

Answers

Answer:

Hope you uderstand this answer

Multiple Choice
Which of the programs below will result in the following output?
Hours
8
85
10
Total
26.5

Answers

Answer:

print("Hours")

print(8)

print(8.5)

print(10)

print("Total")

print(8 + 8.5 + 10)Explanation:

Answer:

A

Explanation:

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

a cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or false




Answers

Answer:

True

Explanation:

The CPU controls the computer like a brain controls a body. And yes it takes instruction from hardware and software and runs it.

What is network topology​

Answers

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.

I hope it helps!

Answer:

By definition "Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks."

There are multiple types of network topology that all have different purposes, but they all fall under the same general thing as mentioned above. If you're doing a course about this you'll learn much more in detail about it.. It's way too much to describe here on Brainly so feel free to do some research of your own as well!

Hope this helps and have a nice day!

During user tests for a new app, the users couldn't figure out which buttons to push, even though the design team thought it was obvious. What's the BEST way for the design team to deal with this problem?

Answers

Answer:

add text that describes what the buttons do.

Explanation:

The process of images displayed on the screen that enables the user to interact with the computer is called what?
Time-sharing
Networking
Graphical user interface
Program execution

Answers

Graphical user interface. An user interface is what the user sees and interacts with. Graphical is related to images.
Other Questions
( 32.45 - 4.8) - 2.06 Pseudoscience is Exact and Precise.True False HEY GUYS PLEASE HELP JUST LABEL THEM 1 2 3 and tell me true or false The following cost data pertain to the operations of Rademaker Department Stores, Inc., for the month of March: Corporate headquarters building lease $ 94,000 Cosmetics Department sales commissions-Northridge Store $ 6,600 Corporate legal office salaries $ 58,600 Store manager's salary-Northridge Store $ 11,600 Heating-Northridge Store $ 12,600 Cosmetics Department cost of sales-Northridge Store $ 32,600 Central warehouse lease cost $ 7,600 Store security-Northridge Store $ 14,600 Cosmetics Department manager's salary-Northridge Store $ 5,600 The Northridge Store is just one of many stores owned and operated by the company. The Cosmetics Department is one of many departments at the Northridge Store. The central warehouse serves all of the company's stores. What is the total amount of the costs listed above that are direct costs of the Cosmetics Department An advantage of light microscopes compared to electron microscopes is that light microscopesallow you to view the surface of cells in greater detail than electron microscopes have a higher magnification capability because they use natural light allow you to view living cells, while electron microscopes do nothave a greater resolution available because they use white light need help asap !!!!!!!! You have $60 and your sister has $120. You are saving $7 per week and your sister is saving $5 per week. How long will it be before you and your sister have the same amount of money? 4. A train traveled 300 miles in 2.5 hours. At this rate, how far would the train travel in 9 hours?HELP PLEASE Look at the picture of the prism separating light. Which explains why a prism can separate sunlight into a rainbow of all the visible colors? Right triangle prism with beam of white light touching its right corner and beam of colored light coming out from its base Question 4 options: A. Light of each wavelength travels at a different speed through a vacuum. B. The glass of a prism absorbs some colors and transmits others. C. Light of each wavelength is refracted at a different angle. D. The prism reflects light of each wavelength at a different angle. The Triangular Trade is a large part of what made slavery so successful in the colonies. What is the best explanation for where the Triangular Trade gets its name? Identify two ways Helen yoshida shares her research with the public.Can someone plz answer this question cuz it's due tomorrow 6. A student driver travels at a speed of 3km/h for an hour and a half. Whatdistance does it travel? solve please: 40=8d What are two types of oligarchies?theocracy and monarchydictatorship and theocracycommunism and dictatorshiptheocracy and communism factorize : 8a-b An automobile travels 471 miles in 8 hours.183What is the average speed of the automobile to the nearest mile per hour? The mushrooms thrived without hurting trees. Value systems do not affect spending True or False? Which of the following shows the correct location of Georgia?A Georgia is located in the Southern Hemisphere.B Georgia is located south of Mexico and north of Canada.C Georgia is located on the west coast of the United States.D Georgia is located on the east coast of the United States. The midpoint of AB is M(1, -1). If the coordinates of A are (7,-4), what are thecoordinates of B?