According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Speaking Dyadic Communication Group Communication Interpersonal Communication Dyadic Communication AND Interpersonal Communication

Answers

Answer 1

Answer:

The Last option: Dyadic Communication AND Interpersonal Communication

is the correct one.

Explanation:

Communication can be defined as the process in which one may convey his thoughts or inquires about things.

There are many types of communications as listed above.

Intrapersonal CommunicationInterpersonal CommunicationDyadic CommunicationSmall Group CommunicationPublic CommunicationMass CommunicationOrganizational Communication Intercultural Communication.

Under all these, Interpersonal communication and Dyadic communication are the ones that are between two people.

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

I hope it will help you!
Answer 2

Answer:

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.


Related Questions

Where is the typical location of a touchpad inside of a laptop?
Attached to the keyboard
Next to the RAM
Under the bottom panel
Under the case

Answers

Attached to the keyboard is the typical location of a touchpad inside of a laptop.

Attached to the keyboard

Explanation:

The touchpad, by a long shot the most well-known sort, is a level territory, situated underneath your console. A pointing stick is a little catch situated among your PC's keys. The conventional touchpad is a rectangular, contact delicate cushion, generally focused beneath the console in the scratch pad's palm rest. Moving your finger over the outside of this cushion moves the mouse.

And the cushion is devoted left-and right-click catches, and now and again a middle snap. In the event that you need to right-tap on a workstation without utilizing the trackpad, you can do it utilizing a console easy route. Position the cursor and hold down "Move" and press "F10" to right-click. A few workstations additionally have a particular key called a "Menu" key that can be utilized for right-clicking.

Which line of code will print I like to code on the screen? print("I like to code") print(I like to code) print("I LIKE TO CODE") print = I like to code

Answers

Answer:

print("I like to code")

Explanation:

In the Programming Languages, print() function is used to print any string, display any output or both at the same time as well as we can print it one by one. We can also print addition, subtraction, multiplication and other problems directly without saving it in other objects or variables.

In the above statement, the correct method of printing any string is to write that string inside the parameter with a double-quote.

The second option is incorrect because in it double-quote is not used.

The third option is incorrect because the following sequence is not correct.

Answer:

answer is A, print ( "I like to code" )

Explanation:

Because I do coding.

___ transmission systems transmit tightly focused beams of radio signals from one ground-based microwave transmission antenna to another.

Answers

Answer:

Terrestrial microwave

Explanation:

Based on the information provided it can be said that the type of transmission system being described is called a Terrestrial microwave transmission systems. This is a system used between ground-based microwave transmission antennas which produce a narrow, highly directional signal to another antenna in order to communicate information back and forth. Although very effective, it limits the communication to only the antenna's that have a line-of-sight with each other.

Option d is correct. The correct answer is terrestrial microwave. Terrestrial microwave transmission systems are used for long-distance land-based communications, requiring clear line-of-sight between the antennas due to their high-frequency, short wavelength signals.

These systems require a clear line of sight between the transmitting and receiving antennas due to the short wavelengths of microwave signals, making them suitable for long-distance land-based communications.Microwaves, due to their high frequencies, can carry more information per unit time. This efficiency makes them ideal for both land-based long-distance communications and satellite transmissions. However, unlike cellular systems which use weaker radio transmitters for short distances, terrestrial microwave systems focus on long-distance transmission between antennas.

Hence,option d is correct.

Complete Question:

___ transmission systems transmit tightly focused beams of radio signals from one ground-based microwave transmission antenna to another.

a.Satellite

b.Cellular

c.Downlink

d.Terrestrial microwave

Which properties are true of String objects? a. Their lengths never change b. The shortest string has zero length c. Individual characters within a String may be changed using the replace method d. The index of the first character in a string is one e. Only A and B are true

Answers

Answer:

sjdjk

Explanation:

sx'989

As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on the action from sources on the web, and displaying information on the action in the Excel Help task pane.

Answers

Answer:

Excel Help

Explanation:

Press F1 key to open the excel help window

Or you can also click the excel help button to launch the help window.

Type for whatever you are seeking help for and you will notice suggestions as you type something. These suggestions include online and offline results. If there are too many results then try searching offline it will narrow down the results.

After typing the text and hitting enter, the excel help returns several related topics on the searched query. You can browse through these topics and get help from excel.

George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use?
A. Risk Management Guide for Information Technology Systems (NIST SP800-30).
B. CCTA Risk Analysis and Management Method (CRAMM).
C. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE).
D. ISO/IEC 27005, "Information Security Risk Management".

Answers

Answer:

The methodology for suited for George's use is A. Risk Management Guide for Information Technology Systems (NIST SP800-30)

Explanation:

The Risk Management Guide for Information Technology Systems (NIST SP 800-30) was set in place to conduct risk analysis on federal organizations and their information systems in the U.S.

The other options do not apply to U.S federal government agencies. Hence, George is best suited to use the Risk Management Guide for Information Technology Systems (NIST SP 800-30)

Final answer:

The Risk Management Guide for Information Technology Systems (NIST SP800-30) is the best methodology for George, a risk manager at a U.S. federal government agency, to use during his IT risk assessment.

Explanation:

For George who is a risk manager for a U.S. federal government agency and conducting a risk assessment for his agency's IT risk, the best suited methodology would be A. Risk Management Guide for Information Technology Systems (NIST SP800-30).

This is because the National Institute of Standards and Technology (NIST) possesses guidelines specifically for federal agencies to use when assessing and managing IT risks. More importantly, the SP800-30 guide provides steps for carrying out a risk evaluation and assists in risk mitigation efforts to improve the organization's risk posture.

B, C, and D options can also be followed for risk assessment but NIST SP800-30 is specifically created by a U.S. government organization and it is highly recommended to follow local guidelines.

Learn more about IT Risk Assessment here:

https://brainly.com/question/31632025

#SPJ3

During data declaration, a name is binded to a memory location, what else can be identify as part of this process?

Answers

data declaration means a variable which contain data value and it can be declared as integer, float, character, double, boolean (data types).

example:

int r;

char name;

float g;

double k= 23.34;

Give several examples of hardware and specify whether they are input, processing, output, storage, or communications devices.

Answers

Answer:

Examples of Hardware:

Mouse, Monitor, Keyboard, Scanner, Camera, Speaker, Printer, Game-pad, Joystick, Light-pen, RAM, Motherboard, Hard-Drive, CPU, Flash-drive, CD-Drive, e.t.c

Explanation:

Hardware refers to the physical part of the computer system that can be seen, felt and touch. We have input hardware, processing hardware, output hardware, storage hardware and communication hardware.

Input Hardware:- This refers to the part of the computer that are use to send data into the computer.

Processing Hardware: There are responsible for co-ordinating and controlling the activities of the computer system.

Output Hardware: This refers to the part of the computer that sends signal and processed data out of the computer.

Storage Hardware: These are use for storing data and files.

Communication Hardware: This are devices that allow information to be sent from one person to another.

From our example:

Mouse- Input Device

Monitor- Output Device

Keyboard- Input Device

Scanner- Input Device

Camera-  Input/Output Device

Speaker- Output Device

Printer- Output Device

Game-pad- Input Device

Lightpen- Input Device

Joystick- Input Device

RAM- Storage Device

Motherboard- Processing Device

Hard-Drive- Storage Device

CPU- Processing Device

FlashDrive- Storage Device

CD-Drive- Storage Device

Telephone- Communication Device

In information systems, _____ is information from a system that is used to make changes to input or processing activities.

Answers

Answer:

"Feedback" is the correct answer for the above question.

Explanation:

Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.It is used in communication channels to tell the sender that the message is received by the receiver.It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.

A researcher administers a standardized test to the students in a school testing a new program as well as to students in a similar school as a control group. To what extent is comparison of the average scores for the two groups of students useful for determining the effects of the program?
Of limited usefulness as a pilot study but has many threats to validity T/F

Answers

Answer:

True.

Explanation:

An investigator administers a practice test as the intervention group for all the participants in a school testing out a new curriculum as well as for the participants in the individual school. The analysis of just the scores for the two groups of students is thus of limited usefulness as a pilot study but has many challenges to the point that it is useful to assess the results of the program.

These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

Answers

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

Real-time information processing.Immediacy; Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify. Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week. Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).

What is an unique text-based internet address corresponding to a computer's unique numeric IP address called

Answers

Answer:

This is called a domain name

Explanation:

A domain name is an address used by internet users to access a website.

If you wanted to compute the correlation between one nominal level variable and one interval level variable, which type of correlation should you use?

Answers

Answer:

Phi .

Explanation:

If user needed to calculate the connection between one variable of minimal level and other variable of interval level. So, this is Phi correlation because the coefficient of phi is the function of the connection between material and event, where both variables are recorded (0, 1). That's why the following answer is correct.

Final answer:

To compute the correlation between one nominal level variable and one interval level variable, point-biserial correlation should be used as it measures the relationship between a dichotomous nominal variable and a continuous interval variable.

Explanation:

When looking to compute the correlation between one nominal level variable and one interval level variable, the appropriate statistical technique to use is a point-biserial correlation. This type of correlation is designed specifically to measure the relationship between a dichotomous nominal variable and a continuous interval variable. Since interval level data is quantitative and differences between data points are known and equal, while nominal level data represents discrete categories, point-biserial correlation can provide insights into the strength and direction of the association between these two distinct types of data.

A publisher has a text-only leader board on top of a page, and a text-only small square ad slot within the content of that page. The small square ad slot has a higher a CTR, but the leaderboard has high CPCs. Is there anything the publisher can do to try and increase their earnings?
A. Yes, the publisher should opt in Image ads to both of ad units.
B. Yes, the publisher should change small square ad unit into large rectangle ad unit.
C. Yes, the publisher should make sure the medium rectangle ad unit comes first in their HTML code.

Answers

Answer:

Option B.

Explanation:

On top of a website, a publisher seems to have a text-only scoreboard, as well as a text-only square advertisement slot inside that webpage's material. The square advertisement slot has a low CTR but also has lower CPCs throughout the scoreboard.

So, It's True, the publisher must switch square ad unit into a big rectangle advertisement unit.

What must be done if the intended destination hardware is not supported by the chosen OS?

Answers

Answer:

Unfortunately, you have no other option left, and you need to change the hardware. None of the other options is available to you, and hence you must do this. However, if you want you can check whether certain other operating system supports the hardware you have bought. However, you might not be acquainted with that new hardware, and hence you should change the hardware, and that is the best option for you. Find some alternative.

Explanation:

Please check the answer section.

You recently installed a new RAID controller card in a PCIe expansion slot on your computer. After setting up the controller, you transfer data from the backup you created over to the computer. When you finish the setup, you turn the computer off and return it to its normal location. When you turn the computer on, you immediately receive the error message, "RAID not found." What might be the problem?

Answers

Answer:

Expansion card failed or became unseated.

Explanation:

A current RAID controller card was installed in such a PCIexpress slot on the user's system. Once the device is installed, the user transmits information to the device from those in the backup that you made. While the installation is finished, the system is turned off - and returned toward its correct position. Once he turns on his system, then he immediately obtains the error message that is not found on the RAID.

So, Expansion card may have failed or unseated issues may have emerged.

The problem might be :

Expansion card failed or became unseated.

Here,

A current RAID controller card was installed in such a PCI express slot on the user's system. Once the device is installed, the user transmits information to the device from those in the backup that you made. While the installation is finished, the system is turned off - and returned toward its correct position. Once he turns on his system, then he immediately obtains the error message that is not found on the RAID.

Thus,

Expansion card may have failed or unseated issues may have emerged.

Know more about RAID ,

https://brainly.com/question/31935278

#SPJ6

What technique allows a programmer to change the way in which a method works internally without affecting programs that utilize the method?

Answers

Answer:

implementation hiding allows the programmer to change the way in which a method works internally without affecting the programs that utilize  the method.

Explanation:

Implementation hiding is an example of encapsulation in OOP which enables a programmer or coder to hide method implementation from outside world and in this technique the program is also not affected by the method that it is using

Answer:

Implementation hiding.

Explanation:

A method is a group of one or more statements, defined in a class. The class holds the attributes and behaviours of objects in its class and implements the defined method from an interface.

To avoid the method statements from been seen, it is encapsulated, hidden internally but functional when called upon. This encapsulation process is called implementation hiding.

Web Services: a. Is a hardware application b. Is a software application c. Is an enterprise system d. Is a single database

Answers

Answer:

9qoqoqoqoqooq0qqqqqqqq

You want to send your photographs to a friend.What should you do to make sure that your friend’s e-mail inbox does not get filled?a. Compress Attachmentb. Format Message c. Use Rich Formatd.Use Default Formatting

Answers

Answer:

Option a is the correct answer for the above question.

Explanation:

The compress techniques are used to encrypt the file and convert a larget file into a small one. This is used by some compression software. The above question asked about the method by which the receiver email memory is less used when anyone sends the document to him. It is used by the compression techniques. When the sender compresses the file then the receiver memory is less used. So the Option a is the correct answer for the above question while the other is not because:-

Option b states about the format message which can not help to use less memory. Option c states about the Rich format message which also can not help to use less memory. Option d states about the Default format message which also can not help to use less memory.

Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to the development of the Internet? How or why does autonomy scale?

Answers

Answer:

Explanation:

With an individual domain name we can upload all the content we want, in a free domain or share domain, upload content in some cases have a limit, for example the size of an image, in an individual domain we can add our brand, in a shared, we can add our brand side to company share those domains, we can have our own email address, practically we have a complete autonomy in our website.

Your network is divided into two segments. As the signal travels down the first segment, it becomes weak. To amplify the signals passing to the second segment, the network engineer installed a networking device. Which networking device did the engineer install?

Answers

Answer:

The engineer installed a Bridge

Explanation:

A bridge is a networking device that serves as a link between two or more networks, therefore, making them work as a single network. Bridges function in a similar pattern as hubs and repeaters, however, they are distinct. The MAC address table is maintained to adequately direct transmissions to the receiver.

It is worthy to note that bridges operate on the Data link layer of the OSI (Open system Interconnect) model. It connects and maintains communication between multiple networks.

The bridge installed by the engineer creates stability between the two network segments. It optimizes the signal which makes the network perform better.

A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers connected to the network. (Hint: one word)

Answers

Answer:

Worm

Explanation:

This is what a worm does! It exploits small security holes in networks and computers.

A document that is organized as a step-by-step introduction to the features of a software application is called a ____ manual.

Answers

Answer:

Tutorial

Explanation:

A tutorial is a method of transferring knowledge and may be used as a part of a learning process. More interactive and specific than a book or a lecture, a tutorial seeks to teach by example and supply the information to complete a certain task.

A Tutorial Manual is a document organized as a step by step introduction to a particular course with the purpose of teaching and enlightening about the course.

Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?

Answers

Answer:

The Process Approach

Explanation:

The process approach attempts to codify organizational knowledge through formalized controls, processes, and technologies. Organizations adopting the process approach may implement explicit policies governing how knowledge is to be collected, stored, and disseminated throughout the organization. The process approach frequently involves the use of information technologies to enhance the quality and speed of knowledge creation and distribution in the organizations.

Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the laptop supports 8GB of RAM and that the computer is running only 4GB of RAM. Jenny would like to add four more gigabits of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins.
What module should Jenny order?

1. SO-DIMM DDR
2. SO-DIMM DDR2
3. SO-DIMM DDR3
4. SO-DIMM DDR4

Answers

Answer:

The module that Jenny should order is C. SO-DIMM DDR3

Explanation:

SO-DIMM or "Small Outline Dual In line Memory Module is a type of RAM (Random Access Memory) that is built using integrated circuits.

SO-DIMMs are used in personal computers, notebooks, and laptops. Usually computers with limited space

SO-DIMM DDR3 has 204 pins, and is identified by the single notch it has very close to the center.

Jenny should order a SO-DIMM DDR3 SDRAM because it will fit perfectly into her machine.

If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to have Tracy reach the right edge of the canvas?
answer choices
4 times

8 times

10 times

50 times

Answers

Final answer:

The number of times the code must be repeated depends on the width of the canvas, which is not provided. If hypothetically assuming a canvas width of 400 pixels, Tracy would need to move 8 times to reach the right edge.

Explanation:

The question 'If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to have Tracy reach the right edge of the canvas?' is asking us to determine the number of iterations required for a movement command in a programming context to cross a given distance. To answer this, we need the width of the canvas in pixels. Once the width is known, we would divide it by the movement distance (50 pixels) to find out how many 50-pixel movements are needed to reach the right edge. Since the width of the canvas is not provided, we are unable to give a specific answer. However, if we assume the canvas is 400 pixels wide (as an example), then Tracy would need to move 400/50 = 8 times to reach the right edge.

Final answer:

To reach the right edge of the canvas, Tracy needs to repeat the code 10 times.

Explanation:

To reach the right edge of the canvas, Tracy needs to repeat the code multiple times. Let's assume that the canvas is 500 pixels wide. If Tracy moves forward 50 pixels each time, she will need to repeat the code 10 times (500/50 = 10) to reach the right edge of the canvas.

Axel is finally documenting his work. What could he be writing?

Answers

Answer: maybe his wrtting ezam

Explanation:

In the act of documenting his work, he could be writing an essay, article or an autobiography.

What is a documentation in writing?

A documentation style is known to be an approach used in citation of  different sources that an author of a paper has used.

Note that In the act of documenting his work, he could be writing an essay, article or an autobiography.

Learn more about writing from

https://brainly.com/question/1643608

#SPJ9


A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on other devices?
Same browser
Same encryption certificate
Same Internet provider
Same operating system

Answers

Answer:

Same browser

Explanation:

A user saves a password on a website the user logs into from a desktop. As long as the the browser used is the same and the user has saved the password on the browser, it does not matter which device the user uses, the password would be saved on the website.

Therefore same browser is important for a website to save the password logged in from any other device.

I hope the answer was helpful.

Thanks for asking.

Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Longitudinal design B. Telemarketing C. ​Cross-sectional design D. Experiments E. Casual research

Answers

Answer:

The answer is "Option C".

Explanation:

This technique is also known as walking-sectional experimental research, which only collects information at one stage. The goal of using this strategy is to create a single point, that provides representations to the population of interest, and other choices were wrong, that can be described as follows:

In option A, It is wrong, because this designing technique is used to search the relationship between variables. In option B, It is a form of marketing, that provides communication via telephone, that's why it is incorrect. In option D, It is used in research, that's why it is not correct. In option E, It is wrong, because it is used in business.

In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and that result refers to 0.

Write a while loop that adds the integers from lo up through hi (inclusive), and associates the sum with result.

Your code should not change the values associated with lo and hi. Also, just use these variables : i,lo, hi, and result.

Answers

Answer:

result = 0

i = lo

while i <= hi:

       result = result + i

       i += 1

Explanation:

Initialize the result as 0 to hold the summation value.

Since we are asked not to change the value of lo and hi, our loop control variable is i and initially it starts from lo.

Since we are asked to add the number from lo to hi, while loop condition checks it.

While the condition satisfies (during each iteration), the value of i is added to the result and the value of i is incremented by one.

Final answer:

To add integers from lo through hi inclusively without changing their values, initialize i to lo, use a while loop to increment and add i to result until i exceeds hi.

Explanation:

To solve this exercise and add the integers from lo up through hi (inclusive), without changing the values associated with lo and hi, you can use a while loop in programming. To do this correctly, we will initialize a temporary variable i to the value of lo at the start and use it to iterate until it exceeds hi. The result variable will accumulate the sum of these integers. Here is how the code could look:

i = lo
result = 0
while i <= hi:
   result += i
   i += 1
This loop starts at lo, and for each iteration, it adds the value of i to result, then increments i by 1 until i is greater than hi. The key here is not altering the original values of lo and hi, fulfilling the problem requirement.

Other Questions
Railroad cars are loosely coupled so that there is a noticeable time delay from the time the first and last car is moved from rest by the locomotive. Discuss the advisability of this loose coupling and slack between cars from the point of view of impulse and momentum. You just won the lottery. Congratulations! The jackpot is $35,000,000, paid in twelve equal annual payments. The first payment on the lottery jackpot will be made today. In present value terms, you really won A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg copper conductors. Solar wind particles can be captured by the Earth's magnetosphere. When these particles spiral down along the magnetic field into the atmosphere, they are responsible for ? How does one determine the number of core electrons an atom has?OA. Subtract the atomic number from the atomic mass.OB. Subtract the group number from the atomic number.OC. Add the atomic number and the number of valence electrons.OD. Add the group number and the period number. Plz help me with this the last person who did this for me got it wrong for me so i beg of u someone plz help me out with this i beg due today Jane contracts Tom, a home developer, to build her a new house. In the contract it states that all necessary parts of the home must be complete before the contract is to be considered finished. However, Tom decides it is simply too much work to carpet and tile the home and finishes his work without completing the carpet and tile. Tom breached his contract with Jane. To initiate a lawsuit against Tom, Jane must: in the figure, p q find m1 1. m1 = 692. m1= 503. m1= 614. m1 = 40 The perimeter of this hexagon is 52in. Each longer side measure 1 in. less than 4 times the length of a shorter side. Find the length of the labeled x. A ball is thrown vertically upward with a speed of 19.0 m/s. (a) How high does it rise? m (b) How long does it take to reach its highest point? s (c) How long does the ball take to hit the ground after it reaches its highest point? s (d) What is its velocity when it returns to the level from which it started? Consider an 8-car caravan, where the propagation speed is 100 km/hour, each car takes 1 minute to pass a toll both. The caravan starts in front of toll booth A, goes through toll booth B, and ends after passing toll booth C. Let dAB and dBC be the distance between A-B, and B-C. a. Suppose dAB = dBc = 10 km. What is the end-to-end delay if the caravan travels together (i.e., the first car must wait for the last car after passing each toll booth)? b. Repeat a), but assume the cars travel separately (i.e., not waiting for each other). c. Repeat a) and b), but suppose dAB = dBC =100 km d. Still suppose dAB = dBC = 100 km. Suppose toll booth B takes 10 minute to pass each car (A and C still takes 1 minute per car). Where is the first car when the second car passes B? e. Under the assumption of d), what is the maximum value of dBC such that the first car has passed C when the second car passes B? An escalator lifts people to the second floor of a building, 25 ft above the first floor. The escalator rises at a 30o angle. To the nearest foot, how far does a person travel from the bottom to the top of the escalator?a) 50 ftb) 43 ftc) 87 ftd) 25 ft Find the value of x.80426030 List and explain two results of the increase in trade in Europe A reduction in inventory will improve return of equity by: Group of answer choices A. Increasing cash, which will increase asset turnover B. reducing cost of goods sold, which will increase asset turnover C.Increase assets, which will increase asset turnover and profit margin D. Reducing cost of goods sold, which will increase the profit margin A researcher wants to conduct a secondary analysis using a Centers for Disease Control and Prevention (CDC) database that was collected by the agency solely for surveillance purposes from 1996-2006. The researcher did not participate in the initial collection of the data. The database is publicly available. The database does not include any identifiers. The IRB makes a determination that the individuals whose records will be reviewed do not meet the federal definition of human subjects. Which of the following considerations was relevant to the IRB's determination that this activity does not constitute research with human subjects? A) The researcher will not be interacting/intervening with subjects and the data has no identifiers. B) The CDC is a federal agency. C) The database reflects data collected originally for surveillance purposes. D) The data was collected between 1996-2006. pati tiene que comprar asientos nuevos para un cine que tiene 55 filas de 35 asientos cada una a cuantos asientos devera comparar? Each of the following is a primary consideration in the choice of business entity, except: a. The degree to which the founders' personal assets are protected from liabilities of the business b. The availability of favorable tax strategies c. The desirability for potential investors and lenders d. The entrepreneur's lifestyle Giving brainliestRead the excerpt from Citizenship. Before women were allowed to vote, both men and women organized, protested, and marched. Finally, in 1920, the 19th Amendment to the Constitution gave women the right to vote.How does this example support the author's main purpose in the book?A. It shows how citizens' actions affect today's issues.B. It analyzes how citizenship was different in the past.C. It explains what an amendment to the Constitution is.D. It shows that citizens' actions can change society. i need helpppp! i dont understand this