1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
9

Type a personality is to type b personality as ____________ is to ____________. epinephrine; norepinephrine obesity; cancer time

-conscious; competitive irritable; calm
Social Studies
1 answer:
Illusion [34]3 years ago
4 0
The last comparison is the best
You might be interested in
Judy is a widow who has just sold a valuable parcel of commercial real estate. the proceeds of the sale will keep her from being
Kobotan [32]

The contract is likely to be voidable because it was formed as a result of undue influence. Undue influence is being defined as an individual’s way of influencing others by means of having them to induced them rather than using their own free will or they are influenced without their full attention that can lead to certain consequences.

6 0
3 years ago
Functionalist emile durkheim viewed society as:
vladimir1956 [14]
Emile Durkheim created hypotheses of social structure that included functionalism, the division of work, and anomie. These speculations were established on the idea of social realities, or societal standards, qualities, and structures. 
The functionalist point of view, likewise called functionalism, is one of the major hypothetical viewpoints in humanism. It has its roots in progress of Emile Durkheim, who was particularly intrigued by how social request is conceivable or how society remains moderately steady.
6 0
4 years ago
Many of us use heuristics each day in completing ordinary activities—such as planning our meals, executing our workout routine,
aliina [53]

Answer:

You could include Herbert's Simon's satisficing and Amos Tversky's elimination-by-aspect heuristic rules.  

From Satisficing strategy, you must decide which are your goals, what do you want to achieve through social invitations.

By doing this, you are setting an aspiration level. Then, you choose the alternative that satisfies your aspiration.

On the other hand, you can use elimination-by-aspects heuristic strategy to reduce the number of alternatives that do not meet the aspiration level.

7 0
4 years ago
The articles are confederation had several weaknesses. which weakness was demonstrated by the failure to help stop Shay's rebell
Ivenika [448]

This question is incomplete. Here's the complete question.

The articles are confederation had several weaknesses. which weakness was demonstrated by the failure to help stop Shay's rebellion?

A) there was no judicial branch.

B) Congress could not raise an army

C) amendments required unanimous consent

D) each state printed its own money

Answer: B) Congress could not raise an army

Explanation:

Shays’s rebellion showed that Congress limited powers under the Articles of Confederation and especially the lack of authority to fund an army that could have suppressed the revolt were weaknesses that could lead to the collapse of the new government. The Constitution signed in 1787 was a result of the debate over the authority of the US government, and Shays’s Rebellion was the example needed for that Constitution to grant powers to the states to suppress revolts.

7 0
3 years ago
A researcher is conducting a written survey about people's attitudes toward walking as an exercise option at the local shopping
brilliants [131]

Answer:

option a: Confidentiality of the individual subject's responses

Explanation:

in every research studies, confidentiality in terms of subject used for an experiment is very important. confidentiality in research is when a  research keeps the details about his subject private and allow non one have access to it.anonymous data is usually the best and most easiest way to promote and boast confidentiality in research.

Researchers  usually use different kind of ways to hide their subject data (confidential). they  employ a  way by keeping the records of subject safe with the use of password protected files, encryption when sending information over the internet, e.t.c.  subjects  sometimes can be identified by names,  by mixture of information on subjects e.t.c. therefore, researchers do only report aggregate findings and not the individual-level data of the subject to the  general view/public.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What three European countries were involved in american affairs ?
    9·1 answer
  • Which early church school of biblical interpretation favored a literal understanding of genesis 1?
    10·1 answer
  • The _________ Amendment, ratified in 1967, required the president to nominate a replacement vice president, who must be approved
    8·1 answer
  • People who speak two different languages are ______ able to inhibit their attention to irrelevant information than people who sp
    14·1 answer
  • g Using an example of a contemporary information technology, describe each of Masuda’s predictions for our information society:
    14·1 answer
  • Michael’s mother complains that he is a very picky eater and never likes to try new foods. She states that he will only eat chic
    11·1 answer
  • What is the message or theme of the movie World Trade Center
    12·1 answer
  • In order to keep track of the number of people in a city, the government would take a census every 5 years.
    11·2 answers
  • 20 POINT!!1 I NEED HELP WITH THIS!!
    9·2 answers
  • PLZ HELP URGENT!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!