1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
9

Why is important to build strong connections

Computers and Technology
2 answers:
Murrr4er [49]3 years ago
6 0

Building strong connections with others is one of the most important tasks of humans. People are social beings, and because of this, they enjoy spending time with others. However, for these relationships to bring us satisfaction, we need to be able to build strong connections. Weak connections will not provide us the level of company and comfort that we require. When we have strong connections with others, we are more likely to feel happy and satisfied with our life.

Nana76 [90]3 years ago
4 0
Cause weak ones aren't that strong and can easily break, but a strong connection will last longer and will be harder to break. For example you need to build a connection with your dog or else your dog wont trust you. Basically building a strong connection always you to build the trust stronger.... I think this is the answer you are looking for depending on what connection you are looking for
You might be interested in
Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
Vsevolod [243]

Answer and Explanation:

public class petData

{

private int ageYears;

private String fullName;

private int IdNumber;

public void setName (String givenName)

{

fullName = givenName;

return;

}

public void setAge (int numYears)

{

ageYears = numYears;

return;

}

public void setID (int numID)

{

IdNumber = numID;

return;

}

public void printAll ()

{

System.out.print ("Name: " + fullName);

System.out.print (", Age: " + ageYears);

return;

}

}

From the above, we have defined a class petData, with methods setName, setAge, printAll. These methods all make use of the string variable fullName and integer variable ageYears. From the above, setName method sets fullName variable to name given to its string parameter givenName while setAge method does the same with the ageYears variable in initializing it. This is also done by the ID method. These variables are then used by printAll method in printing out the Name and age of the object which would be created with the petData class

E. g: petData dog= new petData();

3 0
4 years ago
Because mobile users consume information one screen at a time, you should ________ when you're writing to them.
Fiesta28 [93]
Answer:  C
<span>Explanation:  C) Mobile users read messages one screen at a time; therefore, divide your message into small "chunks" of information.</span>
4 0
3 years ago
Why transportation RFP is important?​
liberstina [14]
Accurate and relevant information , a quick process
8 0
4 years ago
What is the gear ratios of a gear train with an input gear of 48 teeth and an output gear of 12?
kondor19780726 [428]

Answer:

D: 4:1

Explanation:

If you divide 48 by 12, you get 4. 12 is 1/4 of 48. Therefore, you keep it at 4:1.

7 0
3 years ago
Read 2 more answers
In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr
vekshin1
Regroup i think that is the answer

6 0
4 years ago
Other questions:
  • Branching is so called because <br>​
    5·2 answers
  • Which of the following is not true of credit cards
    15·1 answer
  • What is the maximum data transfer rate of an ieee 1394a device?
    5·1 answer
  • What's an ip address and what does it do?
    12·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • Two processes are running the same program on a computer. The operating system can set up an access restriction on the control
    7·1 answer
  • If you change the text to bold,you are changing the what?
    9·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses i am a failure sun
    7·2 answers
  • A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!