What best describes the way that businesses tend to represent themselves online?

a) They put an emphasis on the positive and downplay negative feedback.
b) They put equal emphasis on positive, negative, and neutral feedback.
c) They put an emphasis on the negative and downplay neutral feedback.
d) They put an emphasis on neutral feedback and downplay praise and criticism.

Answers

Answer 1

They put an emphasis on the positive and downplay negative feedback. So your answer is a. This is because businesses want to make themselves look good for the public image.

Hope this Helps



Related Questions

Which button is used to set up the pen color?
A. Record slideshow
B. Set up slideshow
C. Custom slideshow
D. Rehearse timings

Answers

C. custom slideshow because this is where you can customise everything you do eg. pen colour, don't etc.

Answer: B. Set up slideshow.

In Microsoft Powerpoint, in order to setup the pen color, you will have to go to the Slide Show tab and click the "Set Up Slide Show" button. The Set Up Show dialog box will contain different customization options.

Some of these options are:

Show type - You may set the mode of the slideshow like full screen, window, and kiosk full screen.

Show Options - Here is where you will find the Pen Color and Laser Pointer Color. You may also select the loop options here.

Show Slides - In the show slides option, you may select the slides that you would like to present.

These are just some of the options that are available in the Set Up Show dialog box.

If you enter 234.567 into a cell that is formatted to display 1 decimal point place, what is the value stored in the cell

Answers

IT WILL NOT BE 234.6 FOR PF GANG JUST TOOK THE TEST

Describe in detail how to determine if a source is credible when conducting research. Justify your response using two or more complete sentences.

Answers

There are many ways  to determine if the information is credible or not. One way is to ask yourself "Did the person or website list cites?"  Cites are good ways to determine if the information is credible or not or not.  Cites mean that you can prove where the information they are presenting came from.

Credibility of source in research.

The details by how one to determine of a source us credentialed when doing the research. Hence its the authencity and the reliability of the source.

Thus answer is subjective and validity of the research.

The credibility is how one can determine the objective and the subjective components of the source of the research. It's the ability to see pervasively in every situation.Make sure it is relevant to your essay or paper, then check the website address before using it.

Learn more about the to determine if a source is credible when.  

brainly.com/question/11155405.

Which step creates a connection between a file and a program in python?

Answers

The step of opening a file creates a connection between a file and a program.Opening an output file usually creates the file on the disk and allows the program to write data to it.Opening an input file allows the program to read data from the file.

If you change the text to bold, you are changing the _____.
A.)Style
B.)Size
C.)Spelling
D.)Effect

Answers

a.)style because all your doing is changing shape nothing else

If you change the text to bold, you are changing the style. Thus, the correct option for this question is A.

What is Font style?

Font style may be defined as of process that is significantly designed to be used in specific sizes in order to emphasize a particular message or enhance readability. It is often used for headings and other attention-grabbing text.

According to the context of this question, font size governs the actual length of characters in a specific style. While spelling deals with correctness without any error made. So, only style involves any sense of alteration in the text which is either bold or italics. The font effect characterizes the different effects on perception.

Therefore, if you change the text to bold, you are changing the style. Thus, the correct option for this question is A.

To learn more about Font style, refer to the link:

https://brainly.com/question/988937

#SPJ2

Which computer career field enables you to create and design interactive multimedia products and services?

Answers

i think its graphic design

Before installing any software, it's always important to back up your system and to create a BLANK, which enables you to go back to your computer's previous settings if anything goes wrong during a new software installation

Answers

whats the question supposed to be so I can answer it?
A system restore point. Leave a thanks

Define an analog and digital signal

Answers

An analog signal is a continuous wave that changes over a time period.
A digital signal is a discrete wave that carries information in binary form.

Which of the following describes what a manufacturing engineer does?

Answers

what's the following is there a b c d or is it just writing it out

if you were going to construct a table that only included shape names with number prefixes, which shape would you include

square

circle

oval

triangel

Answers

The answer would be A. square

Answer:

Well the real answer is D. Triangle :) hope this helps anyone in connections academy! :)

Explanation:


________ is a crime that uses mock (fake) sites to trick people into sharing information.

Answers

Phishing is a crime that uses mock (fake) sites to trick people into sharing information.

Answer: The correct answer is Pharming

Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the subject q has over an object s.

Answers

command delete_all_rights(p, q, s)
delete read from a[q, s];
delete write from a[q, s];
delete execute from a[q, s];
delete append from a[q, s];
delete list from a[q, s];
delete modify from a[q, s];
delete own from a[q, s];
end

explain the key reasons why entity relationship modeling is important, and determine at least (1) way in which it impacts the overall development of the database.

Answers

Final answer:

Entity relationship modeling is important in database development as it represents the relationships between entities and helps ensure data integrity.

Explanation:

Entity relationship modeling is important in database development because it helps to represent the relationships between different entities in the database. It provides a visual representation of how data is organized and related to each other. For example, in a retail database, an entity relationship model can show the relationship between customers, orders, and products.

One way in which entity relationship modeling impacts the overall development of the database is by helping to ensure data integrity. By defining the relationships between entities and specifying the cardinality and constraints, entity relationship modeling helps to enforce referential integrity and prevent inconsistencies in the data.

SEO Keywords: entity relationship modeling, database development, data integrity

To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated by        A. spaces.   B. line breaks.   C. paragraphs.   D. tabs.  

Answers

To copy text in a Word document to an Excel spreadsheet, you should first format the text as a Word table or as text separated by D. tabs. 

Answer: D) tabs.

Explanation:

If any content is required to be copied from Word document to Excel spreadsheet then the text formatting is the step that should be followed so that structure of the text doesn't change in Excel spreadsheet. Text while formatting can be spaced with other through tabs.

Other options are incorrect because space, paragraph or line break are not the feature that are used for separating the content of Word table. Thus, the correct option is option(D).

After a file downloads, you can do any of the following except

Answers

Final Answer:

Load it as a web page. After a file downloads, standard actions include opening it in its native application, viewing it in the Downloads list, or using File Explorer to access the Downloads folder. However, loading it as a web page is not a typical post-download action.

Explanation:

When a file completes its download, the typical action is to open and read its contents. However, the term "simultaneously" implies performing these actions at the exact same time, which is not possible. Opening and reading a file are sequential processes; first, the file needs to be opened, and then its contents can be read. Therefore, while you can certainly open and subsequently read a downloaded file, doing both actions simultaneously contradicts the sequential nature of these operations.

In the context of computer systems and software, tasks are executed in a step-by-step manner. Opening a file involves the initiation of a file-handling process, followed by the reading of its contents. Attempting to perform both actions simultaneously would require the computer to execute two conflicting operations at the same instant, which is not feasible within the standard operating procedures of computing systems. Thus, while you can promptly open and read a downloaded file, the concept of doing so simultaneously contradicts the inherent sequential nature of these operations in computing environments.

Full Question:

After a file downloads, you can do any of the following except

a. open it in its native application from the Downloads list.

b. view it in the Downloads list.

c. use File Explorer to view it in your Downloads folder.

d. load it as a web page.

A table cell contains how many pieces of data

Answers

Answer: One

Explanation: A table is simply rows and columns of data. The point where a row and column intersect is called a cell. A cell contains one piece of data, which can be in the form of text or graphics. For example, The Formatted Table shown contains three rows and four columns. The first row of the table contains titles. Formatting has been applied to help distinguish the titles from the data, and shading has been used to make it easier to read across a row of data. PF...

A grouping within a chart table used to store information or data is called a table cell. Vertical and horizontal rows of cells are used to group cells (columns of cells). Each cell includes data pertaining to the row and column titles with which it is aligned.

What table cell contains how many pieces of data?

A table contains rows and columns of data. A row and a column come together to form a cell. Each cell holds one piece of data, which could be in the form of text or images.

The Formatted Table, for instance, has three rows and four columns. The table's first row is made up of titles. The titles have been formatted to assist set them out from the data, and shading has been utilized to make a row of data easier to read. There are 32,767 possible characters in total for each cell.

Therefore, A table cell contains one pieces of data.

Learn more about table cell here:

https://brainly.com/question/8059827

#SPJ2

Sometimes you're the dog, sometimes the fire hydrant, your thoughts?

Answers

sometimes your mean to people (dog peeing on fire hydrant) sometimes people are mean to you (being peed on)

Which of the following statements about relays is correct? A. A relay is a type of rheostat. B. A normally closed relay closes a circuit when current is applied to the relay coil of wire. C. A relay is an electrical switch that works through electromagnetism. D. A normally open relay opens a circuit when current is applied to the relay coil of wire.

Answers

C. A relay is an electrical switch that works through electromagnetism. 

The statement about relay that is correct is a relay is an electrical switch that works through electromagnetism. The correct option is C.

What is a relay?

In a relay race, a team of four competitors runs equal predetermined lengths in a sprint race while passing a baton-like object to the following runner to continue the race. This event is performed at the Olympics and other World Athletics-sanctioned competitions.

Repeating what you've heard, or broadcasting a signal, message, or program on radio or television: I was the first to hear the news, and I then notified the others. Satellites transmitted television images of the fight all over the world.

Therefore, the correct option is C. A relay is an electrical switch that works through electromagnetism.

To learn more about the relay, refer to the link:

https://brainly.com/question/15274074

#SPJ2

which of the following cannot be performed from the windows task manager?

A) view what application are running from in the background
B) delete a program from the harddrive
C) open a program
D) check recent CPU usaga

Answers

Could be wrong... but it's most likely D.

Task managers are used to monitoring which applications and background processes/ running and also to terminating a program that isn't responding.

The utility tool displays the status of all applications that are currently running.  It is a computer monitoring program included with Microsoft Windows.  This program is capable to include viewing running apps, in both backgrounds or currently open, checking CPU utilization, or opening a new program from the list of those you have installed.

Therefore, the answer is "Option B".

Learn more:

brainly.com/question/7162166

Editing and sorting the data file are steps performed during the ________ stage in the data processing cycle

Answers

Editing and sorting the data file are steps performed during the data preparation stage in the data processing cycle.

Awr174 software creators who produce open source software have chosen to allow people to use their software in different ways. these creators:

Answers

what should I say to finish the question?

Software that sees and possibly records everything that is typed on a keyboard raises the issue of privacy for the person doing the typing. what is this controversial software called?
a. keyfollowing software
b. keyboard monitoring software
c. keycapture software
d. keyhacker software

Answers

The answer should be B - it is also known as a keylogger

Software that sees and possibly records everything typed on a keyboard raises the issue of privacy for the person doing the typing. This controversial software is called "keyboard monitoring software". which is an option (B).

What Are Keyloggers?

The act of collecting a user's computer input without their knowledge is known as keylogging. Every key the user hits is essentially recorded for the attacker to study and utilize. The attacker may obtain a text file containing a log of all the user's actions at any time.

The issue of privacy for the person typing is raised by software that sees and possibly records everything typed on a keyboard.

This controversial software is called "keyboard monitoring software".

Therefore, the correct answer would be option (B).

To learn more about the Keyloggers click here :

https://brainly.com/question/28610948

#SPJ5

What is the problem with assigning a port number to more than one server application?

Answers

Only one daemon (server application) can bind to a port. The second one will fail.

To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unprecedented conditions he and his followers faced?

Answers

St. Cyprian of Catharge is a bishop who is often called the African Pope. His martyrdom justified his status and showed his holiness through the judgments of the church. His assertions strongly propose that he is conscious that he is in a situation that he is being slated for intensifying and spreading the factional partition through rigorist inflexibility by his adversaries in Rome. He knew that the advertising line” Feticissimus” together with his troupe would be vending in Rome. 

Why might a photographer be interested in capturing the human element in his/her images? Describe your favorite example that demonstrates the human element and explain what drew you to this particular image.

Answers

1) A photographer be interested in capturing the human element in his/her images because human beings can be as inspiring as everything that surrounds a photographer. Every artist has its own source of inspiration, and what if artist is the inspiration itself? Exploring human's beauty is the main part of developing your art (in this case photography) skills. 
2) I find hands, to be more exact,wrists, to be the most inspiring part of human body. There is a philosophical aspect in my opinion becuase people use their hands to create. Every person is unique, its hands are unique and these hands can create unique things.

the idea generating technique most often used in writing business letter is?

Answers

free-writing is the correct answer

why is the negative aspect of the scope statement important?

Answers

Scope statement of any person know that he is a best person for discussion,so scope' is the word used to describe every element of a any topic. The person will be in charge of managing scope in addition to resources, time, and money. The details contained in a scope statement will depend on the nature of your discussion and your objectives as any topic.

Hich chip contains the information necessary to start the computer system?

Answers

The BIOS contains the information.

Answer:

philadelphia

Explanation:

Which city was designed on a grid system?

Select the tips you should follow when creating a newsletter.
1.)Know your audience and put yourself in its shoes.
2.)Use fancy fonts and style.
3.)Add many different kinds of graphics.
4.)Get to the point quickly.
5.)Be clear and concise.

Answers

A newsletter is a printed article that contains news and information of a business or any organization. This includes their activities.This is sent via mail or email to concerning individuals. 

From the given items above, the tips that I would follow in creating the newsletter would be: 1, 4, and 5. 

Answer:

Be clear and concise.Get to the point quickly.Know your audience and put yourself in its shoes.

Explanation:

I did the test. One thing to keep in mind is that the answers are mixed up and not in the same place as others.

Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such networks? Support your answer with examples.

Answers

Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


Other Questions
The high temperature in Fairbanks, Alaska was 15.7 F one day. That night, the temperature fell 38.4 degrees. What was the low temperature for the night?Enter your answer as a decimal A Dark Brown Dog by Stephen Crane (excerpt) After a time, a little dark-brown dog came trotting with an intent air down the sidewalk. A short rope was dragging from his neck. Occasionally he trod upon the end of it and stumbled. He stopped opposite the child, and the two regarded each other. The dog hesitated for a moment, but presently he made some little advances with his tail. The child put out his hand and called him. In an apologetic manner the dog came close, and the two had an interchange of friendly pattings and waggles. The dog became more enthusiastic with each moment of the interview, until with his gleeful caperings he threatened to overturn the child. Whereupon the child lifted his hand and struck the dog a blow upon the head. This thing seemed to overpower and astonish the little dark-brown dog, and wounded him to the heart. He sank down in despair at the child's feet. When the blow was repeated, together with an admonition in childish sentences, he turned over upon his back, and held his paws in a peculiar manner. At the same time with his ears and his eyes he offered a small prayer to the child. He looked so comical on his back, and holding his paws peculiarly, that the child was greatly amused and gave him little taps repeatedly, to keep him so. . . . One day, however, the father of the family got quite exceptionally drunk. He came home and held carnival with the cooking utensils, the furniture and his wife. He was in the midst of this recreation when the child, followed by the dark-brown dog, entered the room. They were returning from their voyages. . . . The head of the family saw him at this moment. He gave a huge howl of joy, and knocked the dog down with a heavy coffee-pot. The dog, yelling in supreme astonishment and fear, writhed to his feet and ran for cover. The man kicked out with a ponderous foot. It caused the dog to swerve as if caught in a tide. A second blow of the coffee-pot laid him upon the floor. Which statement is true about the value of |-5|A. It is the distance that 5 is from 0 on the number line.B. It is the distance that 5 is from 5 on the number line.C. It is less than 5.D. It is greater than 5. Which of these summaries best describes act I of Macbeth A.) Macbeth and Banquo meet the three witches, after which they hatch a plot to kill King Duncan. B.) Macbeth is determined to murder Duncan after he meets the witches, but Lady Macbeth protests against the idea. C.)Macbeth and Banquo meet the three witches, who prophesy to them. Later, Macbeth and Lady Macbeth decide to kill Duncan. D.)King Duncan awards Banquo with the title of the Thane of Cawdor for his bravery. This enrages Macbeth, who decides to kill Duncan. Chromium is most commonly mined in the form of chromite, which has the chemical formula fecr2o4. calculate the percent by mass of each element in chromite, and give your answers to four significant digits. When gregor samsa realizes that he has been transformed into an insect his initial reaction is to? If you could invent an ice cream flavor, what kind of flavor would you invent and why? Give at least 3-4 sentences on your reasoning. PLEASE ANSWER In the movie Thor (2011), Thor and his brother Loki physically battle for the throne. Which term describes the conflict best? external internal friendly ironic Bethany read an interview in the city newspaper. The reporter wrote, "It had been six years since Army Captain Kline had been home. He barely recognized most of the people gathered at the airport to welcome him." This article is mostly about aA. group of people at the airport.B. soldier's return to his hometown.C. possible career in the Army.D. man's experience in the war. When you add or subtract a negative number to both sides of an inequality, you should always reverse the sign? by orienting lines so that they attract attention to specific area of a work of art the artist is using Which best describes Buddhism's growth in the centuries following the Buddha's death? Question 11 options: Buddhism did not spread beyond India. Buddhist missionaries spread the new faith, first to Sri Lanka. The Indian prince Siddhartha Gautama brought Buddhism to China. Confucius spread the new faith. Read the excerpt below from the poem I Knew a Woman by Theodore Roethke and answer the question that follows.Let seed be grass, and grass turn into hay:Im martyr to a motion not my own;Whats freedom for? To know eternity.I swear she cast a shadow white as stone.But who would count eternity in days?These old bones live to learn her wanton ways:(I measure time by how a body sways).Source: Roethke, Theodore. I Knew a Woman. The Collected Poems of Theodore Roethke. New York: Random House Inc., 1961. Poetry Foundation. Web. 9 June 2011.Which excerpt is a simile that indicates a thoughtful mood? Let seed be grass, and grass turn into hay: (I measure time by how a body sways). These old bones live to learn her wanton ways: I swear she cast a shadow white as stone. Read the following directions for using a compass, and then answer the question that follows.Find a heading (field bearing):Select a landmark along the route you want to travel. Hold the compass level and point the Direction of Travel Arrow at the landmark.Find your heading to the landmark by turning the compass dial until the N aligns with the red end of the Needle. Read your heading in degrees at the Index Line.Keep the Needle aligned with the N; look up; sight on your landmark and walk to it. Repeat this procedure until you reach your destination.What should you do after you read your heading at the index line?Select a landmark along the route you want to travel.Turn the compass dial until the N aligns with the red end of the needle.Keeping the needle aligned with the N, look up and sight on your landmark.Walk to your landmark, repeating the procedure until you reach your destination. what was Israel's response to the U.N decision From larsa to Mari what was the approximate length of Babylonian from North to south Given: A = O, WA = NO, AS = OT.SSSSASASAAAS Even very young infants show the ability to distinguish between the ____ of language. Which biome is prominent in North America? a. taiga b. savanna c. rainforest d. chaparral 24 students in a class took an algebra test. If 18 students passed the test, what percent do not pass? Question 7 options: A) 6% B) 75% C) 18% D) 25% Steam Workshop Downloader