Answer:
<u>BEST</u>
Option 4
<u>WORST</u>
2
Explanation:
Option 4 is the best cus confronting is better than just watching and letting it happen which in option 2 that's the case
Answer:
C) until the message has been communicated
Answer:
True.
Explanation:
An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.
Abode Illustrator helps to design logos in professional way