Type the correct answer in the box. Spell all words correctly. Karen is a famous hair stylist in New York and caters to big names. A few weeks ago, two hair stylists from South East Asia joined her team. They are shy by nature and hardly communicate with the rest of the members in Karen's team. Which strategy might Karen use to ensure people from minority backgrounds open up and contribute to group communications? Karen might use the strategy to encourage people from minority backgrounds to contribute to group communications​

Answers

Answer 1

Answer: To open them up emotoinally from a personal level then build up to group disscosiuns or counseling

Explanation:

Answer 2

Answer:

inclusion strategy

Explanation:

i got it right on plato


Related Questions

PLEASE HELP ASAP WILL GIVE BRAINLYEST

Answers

A

B

C

D

Web camera   C

Printer   D

Hard Drive   A

Microphone   C

DVD    C

Scanner    C

CPU    B

Monitor     D

You must configure a certificate authority on your network to use EFS. True or False?
a. True
b. False

Answers

You do not need to configure a certificate authority on your network to use EFS.

EFS is the short form for Encryption File System. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using logon authentication and NTFS file permissions), EFS allows to add another layer of security to data.

To encrypt and decrypt data files and folders in EFS, a certificate authority (CA) could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, EFS will generate its own certificate if none does not exist.

The following are other things to note about EFS

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: https://brainly.com/question/10410730

Research on a latest advancement in computing and discuss its potential or how will it impact our lives in the future

Answers

Answer:

hqiauahhwbbwbwbbssbbs

Which of the following is the first step to writing an algorithm?
making a plan
carrying out a plan
extending the problem
understanding the problem

Answers

Answer:

Making a plan

Explanation:

Usually you will get stuck on some problems while making an algorithm, so you should make a plan to push forward more easier.

Answer: understanding the problem

Explanation:

Because you have to understand the problem before making a plan

Write a predicate function called same_ends that accepts a list of integers and an integer (n) as arguments. Return True if the first n numbers in the list are the same as the last n numbers in the list, and False otherwise. For example, if the list was [1, 2, 3, 4, 99, 1, 2, 3, 4], the function would return True if n is 4 and False if n is 3. Assume that n is between 1 and the length of the list, inclusive. Solve It!

Answers

Answer:

5=5

Explanation:

2+2 is 4

Below is the required Python code for the program.

Python

Program code:

# Starting the code

# Defining a function

def same_ends(lst, n):

   # Starting a loop

   if lst[:n] == lst[-n:]:

       return True

   else:

       return False

# Testing the function

lst = [1, 2, 3, 4, 99, 1, 2, 3, 4]

# Printing the values

print(same_ends(lst,4))

print(same_ends(lst,3))

Explanation:

Starting the code.Defining a function.Starting a loop.Testing the function.Printing the values.End up a code.

Output:

Find below the attachment of the code output.

Find out more information about python here:

https://brainly.com/question/26497128

How many hours do you spend on the Internet per day?

Answers

I spend maybe around 5-8 hours depending on my mind set

Which of the following responses is the best example of a problem that can be solved using a computer program?

What flavor of ice cream has sold the most?
What toy will my puppy like the most?
Which flavor of ice cream is my favorite?
Who should I ask to the school dance?

Answers

Answer: a)

Explanation: because the program going to compare the amount of each ice cream flavor have been sold.

List 2 positive impacts of cybersecurity.




**Answer and I will give you brainiliest**​

Answers

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

Is this correct just need somebody to check my answer plz and use your honest answer

Answers

Answer:

your answer looks correct

Python 3.12 LAB: Input and formatted output: Right-facing arrow Given input characters for an arrowhead and arrow body, print a right-facing arrow. Ex: If the input is: * # Then the output is: # ******## ******### ******## #

Answers

The code below prints the required shape using the string manipulations in Python.

In Python, if we multiply a character with a number, we get that character side by side that number of times.

For example: 6 * '#' would give us → ######

Also, we can use + sign to concatenate the strings.

For example: 'hi' + ' there' would give us → hi there

We use this approaches to print the required shape line by line.

Comments are used to explain each line.

The output is attached as an image.

#get the characters from the user

base_char = input()

head_char = input()

#set first row with 6 spaces and 1 head_char

row1 = 6 * ' ' + head_char

#set second row with 6 base_chars and 2 head_chars

row2 = 6 * base_char + 2 * head_char

#set third row with row2 and 1 head_char

row3 = row2 + head_char

#print the rows to draw the shape

print(row1)

print(row2)

print(row3)

print(row2)

print(row1)

You may see another question at:

https://brainly.com/question/22101725

List 2 negative impacts of cybersecurity.



Answer and I will give you brainiliest ​

Answers

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

How many times will the loop body execute:
for i in range(5,9)
A) 1
B) 2.
C) 3
D) 4



I think it’s a But I don’t know

Answers

I’d also say B, which is 2

What is the purpose of a project overview?


to provide specific roles for all of the “little people” working on the project

to provide an “up close” look at the project to the leadership

to provide an “in-depth” look at all of the tasks that will need to be done

to provide a “big picture” of the project to everyone involved

Answers

Answer:

option 3 should be the answer is this helps please give the brainliest award.

Answer: D

to provide a “big picture” of the project to everyone involved

this is the right answer

PLEASE HELP I WILL GIVE BRAINLYEST

Answers

Answer:

I am guessing photoshop

Explanation:

Photoshop is also under the Adobe company of graphics designs

Explain how AI smartphone software in the rental car can be a threat to privacy.





**Answer and I will give you brainiliest**​

Answers

Answer:

because of the gravity of the earth

Explanation:

because of the gravity of the earth

Answer:

Well, just like there is spyware on phones there are very much likely have spyware on cars too. Think about it if a car can connect to your phone via Bluetooth and take calls it can very possibly have a microphone in it. If that microphone was activated it would be a invasion of privacy hence it can be a threat to privacy. This includes dashboard camera and maybe even when you connect your phone to Bluetooth there might still be a possibility that it can steal your data through that.

What keeps a collection of files in one location?

Answers

Answer:

A folder.

Explanation:

You can organize files into folders, which will separate them into groups. Keep in mind that this is meant for computers. Having a folder can group all of the files together, to make them easier to access.

-kiniwih426

A folder
Bc is we’re u put ur files in a place and stay in the same place

What is nanotechnology?​

Answers

Answer:

Nanotechnology is a field of research and innovation concerned with building 'things' - generally, materials and devices - on the scale of atoms and molecules.

Explanation:

The diameter of a human hair is, on average, 80,000 nanometres.A nanometre is one-billionth of a metre – ten times the diameter of a hydrogen atom.

Answer:

Nanotechnology are the areas of science and engineering where phenomena that take place at dimensions in the nanometre scale are utilised in the design, characterisation, production and application of materials, structures, devices and systems.

it's urgent. I will mark you brainliest. is it legal to share your internet connection with your neighbors? explain in three paragraphs.​

Answers

Answer:

It mostly depends (IF YOU ARE COPY-PASTING GO TO EXPLANATION)

Explanation:

It mostly depends, are any of your passwords alike? If so, that can be dangerous, even if you "trust" your neighbor. Your computer could also be infected with malware. The neighbor could make security mistakes, etc. Really think about how much you can trust them.

It can be hard to give them updates on new security such as new passwords. Also, not everyone is completely aware of why you would put the amount of security you do, (more or less than they think should be there) and you could get complaints from them on YOUR security.

It would be best to just politely decline, or get a guest network. Guest networks are safer, but some complications are still there, such as the ones in my second paragraph. So, safest and best option for both parties would be to decline.

Match each term to its definition.

parameter
return value
function

a value that can be passed from a function back to the calling part of a program.

a value that can be passed to a function

a group of instructions that can be used to organize a program or perform a repeated task

Answers

Answer:

Parameter - A value that can be passed to a function

Return Value - A value that can be passed form a function back to the calling part of a program

Function - A group of instructions that can be used to organize a program or perform a reapeated task.

How to do this programming?

Answers

Answer:

let bread = 12.50

let chicken = 45.48

let total = chicken + bread

let tax = 62.04 - total

What the advantages and disadvantages of file sharing to the users​

Answers

Answer:

.....................................

Pls help me to answer this question ASAP

Answers

It’s about yourself. Answer the questions on how you’ve been experiencing them in your life

what type of information system would more be likely to be used by schools?
commercial
scientific data processing
information retrieval and management
automation

Answers

Answer:

probably

informaition retreival

Explanation:

Someone help me please i need to finish this

Answers

Answer:

My digital life is like a adventure because there is so much to discover.

Hope this help please give the brainliest award.

What are the difference generation of computer system?

Answers

Answer:

5 generations

Explanation:

1st generation 1940's to 1950's vacuum tube based.

2nd generation 1950's to 1960's transistor based.

3rd generation 1960's to 1970's integrated circuit based.

4th generation 1970's to 1980's microprocessor based.

5th generation present and future artificial intelligence based.

Using a vue-cli initiated project, make a ticker that will keep track of the number of attendees in a space

Answers

Number of attendees

________(fill in the blank)in online education is intrinsically related to equity.
Accessibility
Communication
Professionalism

Answers

Accessibility is the answer

3. Find the best.

Write a program that will allow an instructor to enter a series of exam scores. After the last score, the instructor should enter a negative number as a signal that there is no more input. Print the average of all the scores and the highest score entered.

Do this with beginner c programming.

Example output:

Exam Average Program
Enter the scores when prompted, negative number to quit.
> 1
> 10
> 5
> -1

Average Score = 5.3333, best = 10

Answers

Answer:

1. is the answer

Explanation:

mark me as brainlest

Write a program that reads numbers from the user until a blank line is entered. Your
program should display the average of all of the values entered by the user. Then
the program should display all of the below average values, followed by all of the
average values (if any), followed by all of the above average values. An appropriate
label should be displayed before each list of values.

Answers

Answer:

nums = []

while True:

   in = input()

   if in:

       nums.append(in)

   else:

       break

if nums:

   avg = sum(nums) / len(nums)

   for i in range(len(nums)):

       if nums[i] == avg:

           print(f"index: {i+1}")

           print(nums[i])

else:

   print(-1)  # if there aren't any values in nums

Explanation:

Assuming that you are coding in Python 3x. The last 'else' statement is an edge case that you might want to consider, I don't know what you want to put there, but I'm just going to leave it as -1.

Assume that two students are trying to register for a course in which there is only one open seat. What component of a database system prevents both students from being given that last seat?

Answers

Answer:

Transaction isolation

Explanation:

The student that has initiated the transaction before the other one will be given the seat. The database will be locked for the second student during the period of transaction of the first student. The transaction isolation level is a state within databases that specifies the amount of data that is visible to a statement in a transaction, specifically when the same data source is accessed by multiple transactions simultaneously.

The component of the database that prevents both students from getting the last seat is: transaction isolation

Data that enters the database are expected to maintain accuracy and also be consistent with the database structure.

So, when both students request for the last seat, the possibilities are:

Student A gets the seatStudent B gets the seat

The following is not a possibility

Both students get the seatNone of the students gets the seat

The above highlights means that, only one of the students would get the seat.

This is possible because of the concept called transaction isolation.

The transaction isolation ensures that the data requested by a user is complete and such data maintains competency.

So, when a student gets the last seat, the next student would not get the same seat (or any other seat), because a transaction has already been completed.

Read more about transaction isolation at:

https://brainly.com/question/13030145

Other Questions
What system kept the poor in SC in poverty for generations? when adding terms, the___?___in which they are added can change What happens to the solar energy absorbed by plants during photosynthesis ? PLEASE EMERGENCY HELP DONT LINK FILES!!!!The floor of a storage unit in the shapeof a rectangular prism has an area of 106 1/4 square feet. The height of the storage unit is 7 1/2 feet. What is the volume of the storage unit?A. 742 1/8ft B. 744 1/4 ft C. 795 1/4 ft D. 796 7/8 ft what is (4315421 X 5378156031 X 3517905631) X 0 Plz help! When a chemical system is at equilibrium, A. the concentrations of the reactants are equal to the concentrations of the products. B. the concentrations of the reactants and products have reached constant values. C. the forward and reverse reactions have stopped. D. the reaction quotient, Picture, has reached a maximum. E. the reaction quotient, Picture, has reached a minimum. Evaluate the neighbors arguments in the following scenario. Are there facts he is overlooking?An elderly neighbor says todays girls are less mature than they used to be. He says it used to be that by the time a girl had a mature body, she had a mature brain to go along with it. The neighbor argues that it all comes down to bad parenting and too much television. QUESTION 10 of 10: You pay $1,000 for your insurance policy that covers up to $1 million in losses. If the insurance company just broke evenon similar policies, which of the following is closest to the odds the insurance company assumes for your making a claim of $1 million?O a) 1 in 2Ob) 1 in 5c) 1 in 50d) 1 in 1,000 help pleaseeee , asap Which option is an example of an internal barrier to seeking help for mental health? HELPPPPP plssssssssss Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69 Apples: 3 for $1.00 Watermelons: $4.39 each Bagels: 6 for $3.50 Set the purchased quantity to the following: 2 dozen oranges, 2 dozen eggs, 20 apples, 2 watermelons, 1 dozen bagels Display the total cost of the bill .In your own words, explain what the Enlightenment period was about? SVP C IMPORTANT a. Relevez les verbes pronominaux. Distinguez les verbesde sens passif et ceux de sens rflchib. Quels verbes pronominaux expriment un changementphysique ? Expliquez ce qu'ils apportent la descriptionde la mtamorphose,Jupiter, roi des dieux, se mtamorphose en homme. Il monte le risultat son fils, Mercure, messager des dieux.Jurrren. Voit que je sens mon coeur battre, mes arteres segonfler, men veines s'allaisser. Je me sens devenir un filure, unsublier de sang... As-tu maintenant l'impression d'tredevant un homme ?MERCURR. Pas encore. Ce que je comtate surtout, devant unhomme, devant un corps vivant d'homme, c'est qu'il change chaque seconde, qu'incessaniment il vicillit. Jusque dans sesyeux, je vois la lumire vieillir.JUPITER. Essayons. Et pour m'y habituer, je me rpte : jevais mourir, je vais mourir...MERCURE. Oh! Oh! Un peu vite ! Je vois vos cheveux pous-ser, vos ongles s'allonger, vos rides se creuser...Jean Giraudoux, Amphitryon 38,acte I, scne 5, 1929 Why do organisms with one color produce few offspring than those with multiple colors? please help if you know this The story "The Golden Fleece" in Bulfinch's Mythology is most likely a fictionalized account of which of the following events?one of the first Greek maritime expeditionsone of the first Greek encounters with piratesone of the first Greek and Roman naval battlesThere is no historical truth in the story. A figure of speech comparing two unlike things using like or as Their cheeks are like roses is a simile *trueFalse Math honestly shouldn't exist- Addison ran 5000 meters from the cops and an average speed of 8 meters/second before he got caught. How long did he run?