1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
4 years ago
5

According to the lecture, in communication, men tend to value ____________.

Computers and Technology
1 answer:
Andru [333]4 years ago
8 0

Answer:

respect?

Explanation:

You might be interested in
. Reorder the following efficiencies from smallest to largest:
alexdok [17]

Answer:

The order of the efficiencies is as following:-

10,000 < 2n < nlog(n) < n5 < n!.

Explanation:

10,000 is constant time whatever will be the size of the problem the efficiency will remain the same.

2n this efficiency is linear it will grow proportionally as the size of the problem increases.

nlog(n) this efficiency is is a bit greater than 2n though it will grow faster than 2n but slower than n2 as the size of the problem increases.

n5 this efficiency is very poor.It is growing very rapidly as the size of the problem increases.

n! is the worst efficiency of them all.

n!=n*(n-1)*(n-2)*(n-3)*(n-4)*.......2*1.

It will grow beanstalk in jack and the beanstalk.

3 0
3 years ago
Three negative impact of littering<br>​
andrew11 [14]

Answer:

planet destroyed

loss of animals

resources wasted

Explanation:

8 0
3 years ago
The role of the
ElenaW [278]

Answer:

Tcp

Explanation:

8 0
3 years ago
What is one way for an entrepreneur to decrease risk?
marysya [2.9K]

Answer

we can  decrease risk for an entrepreneur by creating a team of trusted advisors to rely on.

there are some points that we can take in mind know how  to position our company as a safe position.

revenue streams and additional technology, paving the way for future growth.

Entrepreneurs can use all these  unique strategies to decrease those risk

8 0
3 years ago
What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus
Free_Kalibri [48]

Answer:

This type of malware are called Polymorphic Malware.

6 0
3 years ago
Other questions:
  • When you enable user access control (uac)
    11·1 answer
  • How do you calculate the total voltage in a series circuit with more than one component?
    13·2 answers
  • Who is the inventor of cpu?
    5·1 answer
  • Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time f
    12·1 answer
  • 1000base-t is a standard for achieving throughputs ____ times faster than fast ethernet over copper cable.
    8·1 answer
  • Translate function f into RISC-V assembly language. Assume the function declaration for g is int g(int a, int b). e code for fun
    10·1 answer
  • Am I correct? Please help
    7·1 answer
  • You designed a program to find the midpoint of two points. Which step below corresponds to finding the average of the x-coordina
    15·1 answer
  • What is 11100111 to decimal form?
    9·2 answers
  • Pls anyone answer this Resource sharing is the need of network because?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!