how does communication increase engagement​

Answers

Answer 1

Answer:

because of language we can communicate

Answer 2
Communicators hold a powerful position by influencing the way things are done at work. Effective communicators establish a two-way flow of information for employees, and they also influence managers and executives to communicate better, which leads to stronger employee engagement.

Related Questions

In a business environment, who is responsible for testing a website? the webmaster the website supervisor the customers who visit the site the search engine director

Answers

The correct answer is =
( the webmaster ) ✅✅

Trust me because, the webmaster is a person responsible for maintaining one or more websites. The title may refer to web architects, web developers, site authors, website administrators, website owners, website coordinators, or website publishers.

Answer:

the webmaster

Explanation:

Property Tax

Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.

Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.

Answers

Answer:

sorry i really dont know

Explanation:

Answer:

Here is the C++ program

====================================================

#include <iostream>

#include <iomanip>

using namespace std;

int main(){

const double ASSESS_VALUE_WEIGHT = 0.60;

double houseValue, assessedValue, taxRate, tax;

cout<<"Enter the actual value of property: ";

cin >> houseValue;

cout<<"Enter the current tax rate for every $100: ";

cin >> taxRate;

assessedValue = houseValue * ASSESS_VALUE_WEIGHT;

tax = assessedValue * taxRate / 100;

cout<<setprecision(2)<<fixed<<showpoint;

cout<<"Annual property tax: $ " << tax;

return 0;

}

Explanation:

What is E-Commerce? Answer The Following. Pls Help Me​

Answers

Answer: Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

Explanation: Brainelist Me :)

you want to ensure that a query recordset is read-only and cannot modify the underlying data tables it references. How can you do that?

Answers

To guarantee that a query's recordset cannot make any changes to the original data tables, the "read-only" attribute can be assigned to the query.

What is the effective method?

An effective method to accomplish this is to utilize the "SELECT" statement along with the "FOR READ ONLY" condition. The instruction signifies to the database engine that the query's sole purpose is to retrieve data and not alter it.

The SQL Code

SELECT column1, column2, ...

FROM table1

WHERE condition

FOR READ ONLY;

Read more about SQL here:

https://brainly.com/question/25694408

#SPJ1

Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____. Group of answer choices help his coworkers identify and make any needed changes to their current processes using a DFD rely on the vendor to execute the implementation of the package without his company's participation keep the new software separate from their existing software and historical data create an RFI to collect information from the software vendor about their product's implementation

Answers

There are different kinds of software. Thomas should Unlike create an RFI to collect information from the software vendor about their product's implementation.

A software package often belongs to several organization and the team or one going to install it in your machine.

A request for information (RFI) is known to be a standard business procedure. It is often used to collate basic information about the experience and skills of software development companies you'd like to work with.

Learn more from

https://brainly.com/question/15016176

How might the website owner use theses details other than to verify login details?

Answers

Answer:

They might choose ads based on your activity from your search history or to track location, and to send notifications to you.

Answer:

the website owner can hack your account or sometimes let say u save ur login and password. and u use a community computer that person can go through ur account and do whatever but the owner of the website will not take blame for it and can use ur info

help on my homework, on c++, I'm new to this what do I do.

help on my homework, on c++, I'm new to this what do I do.

Answers

The program based on the information is given below

#take amount in quarters, dimes, nickels and pennies as input and store it in variables

quarters = int(input())

dimes = int(input())

nickels = int(input())

pennies = int(input())

#calculate amount in cents

cents = (quarters*25 + dimes*10 + nickels*5 + pennies)

#convert cents to dollars

# 1 dollar = 100 cents

# n cents = n/100 dollars

dollars = cents / 100.00

#Print the amount in dollars upto two decimal places

print("Amount: $"+"{:.2f}".format(dollars))

What is the program about?

It should be noted that the following weekend as illustrated:

1 quarter = 25 cents

1 dime = 10 cents

1 nickel = 5 cents

1 penny = 1 cent

1 dollar = 100 cents

Using the above data, the code to convert the given amount to dollars is shown above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Do you think that social media platforms are actually designed to addict their users? And if you think so, what evidence can you give for this

Answers

Answer:

Yes, smartphones and social media are both designed to be addictive.

Explanation:

They are intentionally designed to hook the user into frequent use through autoplay, push notifications, chime sounds, etc. Social media developers also use feedback loops. Every time you do or post online your brain experiences a temporary moment of pleasure.

Melissa is writing a class called Cell. Which method has she set up to return a double?

public class Cell
{
private int chromosomes, rna;
public double time, h2o;
private static int cellCount = 0;
private static double mCount = 4.0;

public Cell()
{
chromosomes = 23;
rna = 1;
h20 = 2.0;

cellCount++;
System.out.println(“There are now ” + cellCount + “ cells”);
}

A. public Cell(int a_chromosomes, int a_rna, double a_h20)
{
chromosomes = a_chromosomes;
rna = a_rna;
h20 = a_h20;
}

B. public int getChromosomes()
{
if (chromosomes < 1) {
throw new IllegalArgumentException(“chromosomes is less than 1”);
}
return chromosomes;
}

C. public double get_mCount()
{
return mCount;
}

Answers

Answer:

C. public double get_mCount()

Describe a situation in which there could be a conflict of interest between an IT worker’s self-interest and the interests of a client. How should this potential conflict be addressed?

Answers

A situation in which there could be a conflict of interest between an IT worker’s self-interest and the interests of a client this potential conflict be addressed  state of affairs wherein there may be a battle of hobby among an IT worker.

Which of the subsequent conditions might doubtlessly provide upward thrust to a battle of hobby?

A battle of hobbies takes place whilst an individual's non-public hobbies – family, friendships, economic, or social factors – ought to compromise his or her judgment, decisions, or moves withinside the workplace. Government businesses take conflicts of hobby so critically that they're regulated.

A state of affairs wherein there may be a battle of hobby among an IT worker self-hobby and the hobbies of a purchaser is the transport of the product can be uncertain. The purchaser might also additionally need the product early at the same time as employees can not enforce the product withinside the time frame.

Read more about the potential :

https://brainly.com/question/14427111

#SPJ1

Explain why you do not need expensive equipment to take pictures or record video?

Answers

Explanation:

Expensive equipment is not necessary because from a technical perspective as long as the device has a lens and a mic it should be able to take photos and videos.

Answer: No, you don't not need an expensive camera . It may have better quality or worst quality . A phone car record and take pictures. Using a Light Stand Can give you a better lighting and better angle so you don't have to hold it or put it on your table, lap, or desk.

Explanation: A lot of people think you need to own a good camera to take a good photograph. A more expensive camera can help, but certainly is not essential. To answer the question though, it is 'no' – the equipment really doesn't make any difference to the end result, but does affect the process of getting there.

Byeeeeeee Remember to stan BTS , Wear Your Mask, And Drink Water

One of the most common ways that journalists use social media is to verify the accuracy of information.
true or false

Answers

ANSWER: False

EXPLANATION: Social media is not a credible source.

It is true that one of the most common ways that journalists use social media is to verify the accuracy of information.

Social media is frequently used by journalists as a method to confirm the veracity of material. Platforms for social media can offer in-the-moment updates and eyewitness accounts of happenings, breaking news, and other developments. Journalists can double-check facts, obtain more information, and assess the reliability of sources before publishing a piece by keeping an eye on social media posts. However, it's crucial to remember that social media may also serve as a source of false information, so journalists should exercise caution and double-check their sources.

Hence, it is true that one of the most common ways that journalists use social media is to verify the accuracy of information.

To learn more about information, here:

https://brainly.com/question/33427978

#SPJ3

12.2 question 3 please help

Instructions

Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}

Answers

Answer:

def swap_values(dcn, key1, key2):

   temp = dcn[key1] # store the value of key1 temporarily

   dcn[key1] = dcn[key2] # set the value of key1 to the value of key2

   dcn[key2] = temp # set the value of key2 to the temporary value

positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}

print("Initial dictionary: ")

print(positions)

swap_values(positions, "C", "PF")

print("Modified dictionary: ")

print(positions)

Explanation:

What is the stdio.h header file ?​

Answers

Sorry I’m confused wdym?

b) Given a = 2, b = 3 and c = 5, evaluate the following logica i. (a b) && (c != 5) c) Declare and Initialize the following using the appropriate.
i. Soccer scores
ii. Area of a triangle
iii. 365 (N.B. no. of days in a year)
c. Assume x = 4, y = 7, and z= 2. What value will be store each of the following statements?
i. result = x/y;
ii. result = y* 2;
iii. result = y + z;
d. What is the output for the expression below?
x = 6
y = ++x
PRINT x
PRINT y ​

Answers

b)

i. (a b) && (c != 5) evaluates to false because (2 < 3) is true, but (5 != 5) is false.

c)

i. Soccer scores can be declared and initialized as an array of integers, like this: int[] scores = {2, 1, 4, 3, 0};

ii. The area of a triangle can be calculated using the formula: area = (base * height) / 2. To declare and initialize the area of a triangle, we need to know the base and height. For example, if the base is 5 and the height is 3, we can write: double area = (5 * 3) / 2;

iii. The number of days in a year is a constant value that can be declared and initialized using the keyword "final": final int DAYS_IN_YEAR = 365;

c)

i. result = x/y; evaluates to 0 because x = 4 and y = 7, so 4/7 is less than 1.

ii. result = y* 2; evaluates to 14 because y = 7, so 7 * 2 = 14.

iii. result = y + z; evaluates to 9 because y = 7 and z = 2, so 7 + 2 = 9.

d)

The output for the expression below is:

x = 6

y = ++x

PRINT x // output is 7

PRINT y // output is 7

The expression "++x" increments the value of x by 1 before assigning it to y, so y is equal to 7. When we print x, the output is also 7 because x was incremented by 1.

question below in attachment

Answers

You can use basic HTML elements like input, select and textarea to generate an HTML web-form and gather the data for the code table.

What is the program?

The form in this code case is configured to use the "post" method and directs to "insert_item.php", a PHP script that manages the form submissions. The structure comprises of input sections for the "name", "description", and "quantity" cells in the "item" table, as well as a button for submitting the information.

One method of collecting user input from a web-form and adding it to a database table is by utilizing PHP and SQL commands, which enables connectivity to the database and the ability to run the INSERT query.

Learn more about  program from

https://brainly.com/question/26134656

#SPJ1

question below in attachment
question below in attachment
question below in attachment

consider a channel that can lose packets but has a maximum delay that is known. modify protocol rdt2.1 to include sender timeout and retransmit. informally argue why your protocol can communicate correctly over this channel.

Answers

Here, we include a timer whose value exceeds the known propagation delay round trip. The "Waiting for ACK and NAK0" & "Wait on ACK or NAK1" statuses now include a timeout event.

What function does ACK serve in TCP?

A shorthand for "acknowledgement" is ACK. Any Http packet that confirms accepting a message or a collection of packets is known as an ACK packet. A Udp packet the with "ACK" flag activated in the header is the scientific definition of the an Ack message.

ACK is delayed; why?

A TCP packet's reception acknowledgement (ACK) can be delayed by delayed ACK by up to 200ms. By decreasing network traffic, this delay enhances the likelihood that the ACK may be transmitted concurrently with the reply to the received packet.

To know more about Waiting for ACK visit:

https://brainly.com/question/27207893

#SPJ4

To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on the DRAWING TOOLS _____ tab.

Answers

Answer:

thank you good sir!!!!!!!!

Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.

Question 6 options:

An SHG entity depends on a Campaign entity

A Campaign entity is a depend on the SHG entity

A Country is not dependent on the Campaign entity

An SHG entity is dependent on a Country entity

A Campaign is an Independent entity

Answers

Based on the given information, the following statements are true:

An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.

What is a country entity?

In the context of database design, a country entity refers to a logical representation of a country within a database system.

It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.

The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.

Learn more about Entity at:

https://brainly.com/question/29491576

#SPJ1

In business writing, which statement best describes "tone?"

Answers

Tone would help you determine whether your boss is pleased or angry in a workplace email. Thus, option D is correct.

The tone of an email or every written text can help us determine what was the emotional state of the writer, as the way the phrases are formed and all the textual elements will form a pattern that is recognizable for the readers.

So, from the tone of an email, it is possible to determine whenever the writer was pleased or angry.

Thus, Tone would help you determine whether your boss is pleased or angry in a workplace email. Thus, option D is correct.

Learn more about tone on:

https://brainly.com/question/1416982

#SPJ1

The complete question will be

Which of the following would help you determine whether your boss is pleased or angry in a workplace email?

A. Formality

B. Consistency

C. Wordiness

D. Tone

Integers limeWeight1, limeWeight2, and numKids are read from input. Declare a floating-point variable avgWeight. Compute the average weight of limes each kid receives using floating-point division and assign the result to avgWeight.

Ex: If the input is 300 270 10, then the output is:

57.00

how do I code this in c++?

Answers

Answer:

Explanation:

Here's the C++ code to solve the problem:

#include <iostream>

using namespace std;

int main() {

  int limeWeight1, limeWeight2, numKids;

  float avgWeight;

 

  cin >> limeWeight1 >> limeWeight2 >> numKids;

 

  avgWeight = (float)(limeWeight1 + limeWeight2) / numKids;

 

  cout.precision(2); // Set precision to 2 decimal places

  cout << fixed << avgWeight << endl; // Output average weight with 2 decimal places

 

  return 0;

}

In this program, we first declare three integer variables limeWeight1, limeWeight2, and numKids to hold the input values. We also declare a floating-point variable avgWeight to hold the computed average weight.

We then read in the input values using cin. Next, we compute the average weight by adding limeWeight1 and limeWeight2 and dividing the sum by numKids. Note that we cast the sum to float before dividing to ensure that we get a floating-point result.

Finally, we use cout to output the avgWeight variable with 2 decimal places. We use the precision() and fixed functions to achieve this.

Final answer:

The student can code the calculation of the average weight of limes that each kid receives in C++ by declaring integer and double variables, getting input for these variables, and then using floating-point division to compute the average. The result is then assigned to the double variable which is displayed with a precision of two decimal places.

Explanation:

To calculate the average weight of limes each kid receives in C++, declare three integers: limeWeight1, limeWeight2, and numKids. Receive these values from input. Then declare a floating-point variable avgWeight. Use floating-point division (/) to compute the average weight as the sum of limeWeight1 and limeWeight2 divided by the number of kids (numKids). Assign this result to your floating-point variable (avgWeight). Below is an illustrative example:

#include

  cin >> limeWeight1 >> limeWeight2 >> numKids;

}

Learn more about C++ Programming here:

https://brainly.com/question/33453996

#SPJ2

i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help.

Answers

Since your computer add new tabs when you are working and the thing to do are:

You may manually scan for malware as well.Launch Chrome.Click More. Settings in the top right corner.After clicking Advanced Reset, tidy up. tidy up the PC.Choose Find.Click Delete if you are prompted to remove undesirable software. Your computer might need to be restarted.Why do my computer's tabs keep growing?

The chance exists that some form of malware has been installed on your computer, and this is what is causing the tabs to open randomly. Corrupt Installation: It's also possible that this problem is being brought on by a corrupt Chrome browser installation.

To access the Chrome Settings menu, enter chrome:/settings and press Enter. In the Extensions tab, locate New Tab.

One can still solve the problem by: To access the Chrome Settings menu, enter chrome:/settings into the address bar of Chrome and hit Enter. Click on the trash can icon on the "Extensions" tab of the Chrome Settings menu.

Please look for any further dubious extensions that you do not use or are unsure of their origin and remove them as well.

Learn more about Malware attack from

https://brainly.com/question/17311729
#SPJ1

In HTML5, the
(line break) tag does not require a closing tag.


true or false

Answers

True in HTML 5 line break tag doesn’t require closing tag

A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act will be the person punished?

I-SPY
CFAA
Digital Millennium Act
SOPA

Answers

Answer:

Digital Millennium Act

Explanation:

The Digital Millennium Copyright Act  is a United States copyright law that implements two  treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization  Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer

Hope that helped.

k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter. True or False? Why?​

Answers

Answer:

false

Explanation:

its false

The most effective technique of malware propagation among the following list

Answers

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

Help is very much appreciated. Thank you for your time!

Answers

Answer: 266299         669922         292629        969622        Also just saying did you backup your files to the cloud?  If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.

Explanation:

Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.

Answers

The  outline that a person can use to implement as well as compare the pseudo-LRU and that of the  true-LRU cache replacement policies is given below

What is the code  about?

First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.

Thereafter one need to Run simulations with the use of the already modified  or changed code via the use of the default configuration as said in Question 3 of Project Part 1.

Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions.  etc.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

HELP ME OUT PLEASE!!!!!

Location, such as indoor versus outdoor, is an important consideration when taking photographs.

True False​

Answers

Answer:

I'd say true

Explanation:

Because you can't do all the different techniques and styles if you're indoor instead of outdoor or vice versa. There is also lighting to consider

Answer:

true

Explanation:

Have good day

Given string userText on one line and character fourthChar on a second line, change the fourth character of userText to fourthChar.

Ex: If the input is:

cheetah
v

then the output is:

chevtah

Note: Assume the length of string userText is greater than or equal to 4.

Given string userText on one line and character fourthChar on a second line, change the fourth character

Answers

Answer:

# Get the input from the user

userText = input()

fourthChar = input()

# Replace the fourth character of the string with the new character

userText = userText[:3] + fourthChar + userText[4:]

# Print the modified string

print(userText)

Explanation:

This code first gets the input from the user and stores it in the userText and fourthChar variables. It then uses string slicing to replace the fourth character of the string with the new character. Finally, it prints the modified string.

The input string is cheetah, and the fourth character is e. The code replaces this character with the new character v, resulting in the modified string chevtah.

Other Questions
Janine is writing an article about the life of a local actor, but searching his name brings up many famous people with the same name. In this scenario, which search term should she use? exists when a particular practice is necessary for the safe and efficient operation of the business, and there is a specific business purpose for applying a particular standard that may, in fact, be discriminatory. a. bfoq b. job relatedness c. business necessity d. required exception e. necessary allowance solve the inequality 7x+5>2x+35 in the apology, when socrates asks for any corrupted youth to come forward and speak against him, who comes forward? helpppp with this :> a movement of the eye that is automatic and involuntary is called a. smooth pursuit movement. b. reflexive movement. c. vergence. d. rapid pursuit movement. e. a saccade. Write a system of equations to describe the situation below, solve using any method, and fill in the blanks.An online boutique is having a special on personalized baby items. On Monday, they sold 24 personalized baby blankets and 2 personalized hooded towels, for a total of $790 in receipts. The following day, they received orders for 24 personalized baby blankets and 4 personalized hooded towels, which brought in a total of $836. How much does each item sell for? Can somebody please help me!! How does collusion interfere with competition? What are the slope and y-intercept of the line 3x-2y=12 Ava ate 5 wheat crackers, or 5% of the entire box. How many crackers were in the box? crackers were in the box. How was the British attack at the Battle of Bunker Hill different from the one at the Battles of Lexington and Concord? At the Battle of Bunker Hill, the British attacked from ships and on foot. At the Battle of Bunker Hill, the British attacked with fewer soldiers. At the Battles of Lexington and Concord, the British arrived in canoes. At the Battles of Lexington and Concord, the British did not shoot their guns at all. Find the angle if it is half of its supplement. The ability of any firm to operate in the long run depends on attaining an acceptable level of profits. 1) True 2) False Strategic alliances are often undertaken because the partners want to learn from one another. 1) True 2) False The main reason for backward integration is to attain the advantages of predictability of demand for a firms' output. 1) True 2) False Few innovative ideas prove to be profitable. 1) True 2) False what can your core values be considered as a. your opportunities b.your decisionsc.your roots d.your laws Does y=-4/5x represent a direct variation is yes,identify the constant of variation A play, film, or series may be historically inaccurate for all of the following reasons except 1. budget constraints 2. decreased relatability Mrs. Wrights broken jars of preserves symbolize her broken household. What thematic knowledge is necessary to make this connection? an understanding that Mrs. Wright has become unstable an understanding that Mrs. Wright is considered responsible for the home an understanding that the jars were a prized possession. Directions: Write five different sentences about presidents in general, about specific presidents, orabout Presidents' Day in America. Make sure to use at least one infinitive in each sentence infinitive. Help please and explain this for me please thanks