Which of the following is an example of self-awareness?

Answers

Answer 1
Are you sure this is the right subject
Answer 2
5 Examples Of Self-Awareness In Everyday Life

1.) Knowing and accepting your preferences. I am not a morning person. ...

2.) Checking in with your body. Most people don't really notice that their bodies are working for them until they aren't working for them. ...

3.) Choosing to be disciplined (or not). ...

4.) Recapping a conversation. ...

5.) Taking in some beauty.


Related Questions

What month of the year has 28 days?

Answers

Every single month has 28 days. This is a trick question.

Answer: February

Explanation:

what is an electronic device that manipulates information, or "data"​

Answers

Answer:

Computer

Explanation:

A computer is a very functional electronic device that has been helping people since decades ago. It has so many functions including the manipulation of data. It means the computer can control volumes of data on its own. Such manipulation means that it can store data in several locations and recover them. It also operates by processing data in a very quick manner.

Which of the following uses of the Internet is unethical?
purchasing vacation flights online during the evening
purchasing vacation flights online during the weekend
purchasing vacation flights online during work hours
purchasing vacation flights online during a bus ride

Answers

Purchasing vacation flights online during work hours is the  uses of the Internet is unethical. Hence, option C is correct.

What is considered Internet is unethical?

Five immoral applications of computers include media piracy, ransomware attacks, identity theft, financial fraud, and theft of intellectual property.

Unethical: A student plagiarized in their last written paper to boost their GPA. It is unethical to do this since it goes against societal norms and the majority of people would find it disagreeable.

When something is "illegal," it means it violates the law, as opposed to when it is "unethical," which means it is morally wrong. The legal system determines what constitutes an illegal act. In circumstances of unethical behaviour, a man's own conscience is the deciding element. Even if an unethical act may be immoral, it may not be against the law.

Thus, option C is correct.

For more information about Internet is unethical, click here:

https://brainly.com/question/11181425

#SPJ6

Explain whats Cropping in your own words (photos) ​

Answers

It’s just means to make sure all of the words in the question are cropped enough that the system will be able to process and read it to give you the answers you need I hope this helped!

;w;) - Actually, cropping is just removing parts of a picture to have the main scene on focus. I was once in a photography class, and I took a picture of the Appalachian mountains.

a statement or account giving the characteristics of someone or something is called?​

Pa-sagot po pls need ko na po ng answer rn.Thank you so much po in advance

REPORT
✔︎Naghahakot ng pts
✔︎Non sense answer

Brainliest
✔︎RIGHT ANSWER

Answers

a statement or account giving the characteristics of someone or something is called description.

I hope it's help ^^

When a device sends a RS NDP packet, looking for a new local IPv6 router, which destination address would be involved in this request

Answers

The destination address would be involved in this request is the Address Resolution Protocol (ARP)

How does NDP functions in IPv6?

In IPv6, the Address Resolution Protocol (ARP) is known to be the one that often is replaced by the Neighbor Discovery Protocol (NDP).

The IPv4 command is one that depicts the fact that ARP has been replaced by the IPv6 command . The information that is often shown by this command are the IP address, the MAC (Link Layer) address, etc.

Learn more about  destination address  from

https://brainly.com/question/24930846

What type of a structure is the best way to iterate through the characters of a string?.

Answers

Answer:Using the character iterator is probably the only correct way to iterate over characters, because Unicode requires more space than a Java char provides. A Java char contains 16 bit and can hold Unicode characters up U+FFFF but Unicode specifies characters up to U+10FFFF.

Explanation:

TRUE or FALSE. 2. 1 Information is a collective term used for words, numbers, facts,

Answers

Answer:

True

it is the best way to get words facts and number

50 points The system administrator role began in the late 1970s and involved physically managing _____ and _____.

A.
hardware; databases

B.
software; databases

C.
hardware; networks

D.
software; networks

Answers

The system administrator role began in the late 1970s and it involved physically managing: C. hardware; networks.

Who is a system administrator?

A system administrator can be defined as an individual who is saddled with the responsibility of configuring and managing an informations system (IS), which typically involves the physical management of hardware and networks.

Historically, the role of a system administrator began in the late 1970s and it involved physically managing the components of an informations system (IS) such as:

HardwareNetworks

Read more on hardware here: brainly.com/question/959479

Which statement best describes the logic in a while loop?bringing an umbrella to determine if it is rainingbringing an umbrella regardless if it is rainingdetermining if there is rain before bringing an umbrelladetermining if an umbrella is available in case of rain

Answers

Answer:

B. If it is raining, bring an umbrella regardless.

Explanation:

Here is the code syntax:

while _ = true

print(rain)

In short words, this syntax is basically saying while a condition is true, do this. "This", is the function run under the true condition. For while loops to work, at least one condition of anything must be true.

Hope this helps!If that's the case, please give thanks!

NEED ASAP WILL MARK BRAILIEST
Many people are concerned about data privacy. Imagine that you were hired to advise a company about how they can be sure that their customers’ data stays private. What would you tell them?

Answers

Answer:

Conduct a data privacy audit. See where and at what level the company is collecting data and check your legal obligations

Minimize data collection and retention. The more data you hold the more open you are to being hacked and the more data you collect the more you have to answer to customers

Secure the data you keep. With examples of software you use for security

Post a public privacy policy

Provide a forum for complaints.

Explanation:

What level does Drantini evolve? I'm currently grinding on my TI 84 calculator.

Answers

Answer:

Dratini first evolves into dragonair at level 30, which then later on evolves into dragonite at level 55.

In the future, where will an increasing majority of data come from?

Answers

In the future, where will an increasing majority of data come from the cloud.

Where will more of data come from?

A lot of Data volumes is said to increase and thus it will move or migrate to the cloud.

Note that the majority of big data experts were said to have agree that the numbers of generated data will grow very fast in the future and it will be one that its growth can come from  social data, machine data or transactional data.

Learn more about data from

https://brainly.com/question/19243813

A section in a history book describing the conditions and causes of the Great Depression in the Midwest in the 1930s. a. Entertain b. Persuade c. Inform ​

Answers

Answer:

I hope this helps

Explanation:

Inform

Which type of removable media uses a laser to pick up deformities embedded in the media that contain the information

Answers

Answer:

Optical

Explanation:

When writing an algorithm, plans are reviewed before they are carried out.
True
False

Answers

I believe it’s true. It would make the most sense anyways.

Answer:

Its false here is proof

Explanation:

When using the routing information protocol (rip) to transfer data from one network to another, the path ____ is chosen.

Answers

Answer:

When using the routing information protocol (rip) to transfer data from one network to another, the path with the smallest number of hops is chosen.

Alicia is typing a research paper. She is having difficulty remembering the proper format for the references. Alicia should _____.

A. leave out the reference list.
B. Hope that nobody notices that the references are not in the correct format.
C. Include the references in the appendices.
D. Look up the APA guidelines for formatting a reference.

Answers

Answer:

D

Explanation:

i'm not 100% sure, sorry.

If Alicia is facing difficulty in remembering the proper format for the references. She should look up the APA guidelines for formatting a reference. Thus, the correct option for this question is D.

What is reference formatting?

Reference formatting may be characterized as a type of process that should appear in bold in upper and lower case and be centered at the top of the page. All reference entries should be double-spaced.

All references should be in a "hanging indent" format. Apart from this, it also includes a set of guidelines through which texts are arranged and regulated with respect to it the same pattern.

It should be required for all if they forget the actual format of any reference, they have to look it up once prior to its completion in order to reduce the chances of corrections.

Therefore, if Alicia is facing difficulty in remembering the proper format for the references. She should look up the APA guidelines for formatting a reference. Thus, the correct option for this question is D.

To learn more about Reference formatting, refer to the link:

https://brainly.com/question/27557318

#SPJ2

I WILL MARK BRAINLIEST Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what are common tasks performed by Graphic Designers? Check all that apply.

conferring with clients
creating designs, concepts, and sample layouts
scheduling projects for clients
hiring and training new team members
determining size and arrangement of illustrative material and copy
developing graphics and layouts

Answers

Based on the information given, the tasks that are performed by graphics designers are:

conferring with clientscreating designs, concepts, and sample layoutsdetermining size and arrangement of illustrative material and copydeveloping graphics and layouts.

It should be noted that graphic designers confer with clients and

create designs, concepts, and sample layouts.

They also determine the size and arrangement of illustrative material and copy as well as develop graphics and layouts.

Learn more about O'Net on;

https://brainly.com/question/5605847

Answer: Abef.

Explanation:

Kathy wants to add the numbers entered in a range of selected cells. To do this, which tab will she click on the menu that appears after clicking on Totals in the Quick Analysis option

Answers

The tab that she will click on the menu that appears after clicking on Totals in the Quick Analysis option is Sum

What is quick analysis?

Quick Analysis is known to be the tool that helps one to known a range of data and it also aid one to pick the right chart with just some commands.

Note that in this tool, one has to Select a range of cells, also Select the Quick Analysis button that will show at the bottom right corner of the the clicked data.

See options below

a.

Sum

b.

Count

c.

Average

d.

Learn more about Quick Analysis from

https://brainly.com/question/23810306

'true or false'
a. email is expensive than ordinary Postal service.
b. we can Reserve air ticket with the help of internet.
c. sending information from user computer to Server is known as downloading.
d. the email received are stored in inbox.
e. web browser let you download only while Surfing the internet.​

Answers

Answer:

a.false b. true c.false d. true e.true

Explanation:

I hope this help you

Answer:

a = true b=false c= false e=true

Why start topology is more reliable than bus or ringtone topology ?

Answers

Answer:

Star topology is used to ease the probabilities of network failure by connecting all of the systems to a central node. ... In contrast to the bus topology, the star topology allows each machine on the network to have a point to point connection to the central hub and there is no single point of failure.

1. It is the main energy provider in the process of food manufacture in the plant kingdom. *

Answers

Plants make their own food by a process called photosynthesis. Photosynthesis is a process used by plants and other organisms to convert light energy into chemical energy and stored in the form of starch which can be used later.

What are the ending contents of the array? Choices show elements in index order 0, 1, 2. int yearsList[3]; yearsList[0] = 5; yearsList[1] = yearsList[0]; yearsList[0] = 10; yearsList[2] = yearsList[1];

Answers

The array yearsList is used to hold multiple values and variables

The ending content of the array are 10, 5, 5

How to determine the ending content of the array

The first line of the program declares an array variable of three elements

int yearsList[3];

The second line assigns 5 to the 0 index

yearsList[0] = 5;

The next line assigns the value of the 0 index to the 1 index.

So, we have:

yearsList[0] = 5;

yearsList[1] = 5;

The next line assigns 10 to the 0 index.

So, we have:

yearsList[0] = 10;

yearsList[1] = 5;

The next line assigns the value of the 1 index to the 2 index.

So, we have:

yearsList[0] = 10;

yearsList[1] = 5;

yearsList[2] = 5;

Hence, the ending contents of the array are 10, 5, 5

Read more about arrays at:

https://brainly.com/question/22364342

The Director of your company is traveling out of the country with the company laptop. Which feature will you need to configure to prevent theft of the laptop

Answers

The feature you need to configure to prevent theft of the laptop is The LoJack tracking software.

What is LoJack a software?

LoJack is a software that is made for Laptops. It is known to be a proprietary laptop theft recovery software that helps one to have a remote access to lock, delete files from their system.

Thiss app can also helps a person to locate the stolen laptop as with the case of the  Director above.

Learn more about laptop from

https://brainly.com/question/26021194

Please help. Would appreciate it if you answer soon.

Answers

Answer:

C- He shouldn't trust the website for both reasons

Explanation:

Answer:

c

Explanation:

need help!!!!!!!Write a 200 word paper on the new developments, describing how these effect the telescopes, and in what environments these work best.

Answers

Answer:

Development in science and technology have improved many things.It make the trains more better and comfortable . It has replaced steam engine. Development in science and technology have improved our life easier. Because of science and technology modern scientists have made many things like Metro train , Aeroplane , Modern engine etc. Now anyone can go any part of the world because of the help of development in science and technology. Now their are many way for growing crops, It helps the farmer very much.

Explanation:

Can someone buy me eddie van der tabs???

Answers

Answer:

No

Explanation:

U cannot exploit people like that

1. A database table can hold ??

A. A dozen records.

B. Some records.

C. From 0 to billions of records.

D. Two million records.

Answers

Answer:

who are interested and I have been trying to

Which of the following can data mining NOT do?

Question 1 options:

Help spot sales trends


Save a business from bankruptcy


Develop better marketing campaigns


Predict customer loyalty

Answers

Cannot save a business from bankruptcy. Because data mining can analyze trends and make predictions based on this analysis. But data mining isn’t implementation, that is the job of developers or management team

Data mining will not be able to save a company from going bankrupt.

Data mining and bankruptcy:

The technique of collecting and attempting to discover trends in time series is known as trend analysis. Clustering, classification, regression, and other data mining techniques can be utilized to uncover certain patterns.

Data mining may be used to evaluate patterns and generate predictions based on that information. Data mining, on the other hand, is not implementation; it is the responsibility of the developers or leadership team.

Find out more information about 'Data mining'.

https://brainly.com/question/13954585?referrer=searchResults

Other Questions
Hi, please help me I need help. Given that n is a positive number, write, in a symbolic statement, the square of a positive number decreased by 10 is 6 Apollo 11 first man to step on the Moon.Describe the conspiracy theory itself and the people behind it. Also explain the term conspiracy theory and what it means. Why do you think the theory was created? What makes it possible to classify it as a conspiracy theory?If your using any source please write it down too. Sumatra bought a loaf of bread 24 inches long. She cut it into two pieces. If one piece is9 inches, how long was the other piece? Which two processes will be involved as this chick grows into a chicken? A. Cell growth due to taking in nutrients B. Cell division that involves meiosis C. Cell division that involves mitosis D. Cell growth due to fertilization a) On which hemisphere does Bhutan lie on the earth? A student ran a distance of 3 1 over 2 miles each day for 5 days. Then the student ran a distance of 4 1 over 4 miles each day for the next 5 days.What was the total distance in miles the student ran during these 10 days? how many moles is 784.616 g of H2SO4? Using the quadratic formula to solve PLEASE HELP again-4(3-6)(-3)=______ The STEM Club is renting a pavilion at the amusement park. The number attending varies Inversely to the amount they must pay per person for the rental When 25 students attend, they must pay $17 per person. How many students need to attend if they want to pay under $12 per person? A) 34 B) 35 36 D) 37 Electrostatic Sensitive Devices Google ChromeA Not secure http/209.60.132.173:8080/nidaile/SCE/portal/lessontrame 7.aspx2. A requirement for workbench and tools which are used with ESDs is thattools must be non-metallic and workbenches must be wood coveredtools and work surfaces must be plastictools, work surfaces, and floors must be groundedonly tools mulbe grounded The overall pass rate for law school graduates taking the Maryland bar exam has been reported as 76%. Assume that a certain Maryland law school has had 400 of its most recent graduates take the Maryland bar exam, but only 60% passed. When asked about these results, the dean of this universitys law school claims his graduates are just as good as others who have taken the Maryland bar exam, and the low pass rate for the recent graduates was just "one of those statistical fluctuations that happen all the time." If this universitys overall pass rate were really 76%, what would be the probability of a simple random sample of 400 having a pass rate of 60% or less Translate the following sentences into French. 1. My friends just arrived in Cannes for the festival. Mes amis _____ 'arriver Cannes pour le festival. 2. She is coming with us to the rock concert. Elle _____ avec nous au concert de rock. 3. Do you know his latest song? Est-ce que tu connais sa _____ chanson? 3/13 Drawing a card below a 5 (not including an Ace)O TrueO False Who decides the cases that the Supreme Court will hear? Given: A and B are supplementary angles. mA=4x16; mB=2x+4Prove: mB=68Drag and drop reasons into the boxes to correctly complete the proof.Given: A and B are supplementary angles. mA=4x16; mB=2x+4Prove: mB=68Drag and drop reasons into the boxes to correctly complete the proof. Pls help: 5 multiplied by 245 Three times the complement of an angle is 68 more than the supplement of the angle. Find the angle. Solve for y (2x 18) thats the equation