1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
15

1. Trust can be built in a relationship if:

Computers and Technology
1 answer:
artcher [175]3 years ago
4 0

Answer:

A

Explanation:

because if both parties feel safe communicating and feel understood by the other party they feel safe trusting the other person and it develops a trust worthy relationship

You might be interested in
Nathan would like to save his PowerPoint presentation as a video that can be replayed easily on any device at full quality. Whic
aniked [119]

Answer:

Presentation Quality

Explanation:

7 0
2 years ago
When was the first computer invented?
sweet [91]
The EINAC at the university of pennsylvania, completed in 1946. It weighed more than 50 tons.
4 0
3 years ago
Read 2 more answers
Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a space. Ex: If origList =
Darya [45]

Answer:

#include <stdio.h>

int main(void) {

const int NUM_VALS = 4;

int origList[NUM_VALS];

int offsetAmount[NUM_VALS];

int i;

origList[0] = 20;

origList[1] = 30;

origList[2] = 40;

origList[3] = 50;

offsetAmount[0] = 5;

offsetAmount[1] = 7;

offsetAmount[2] = 3;

offsetAmount[3] = 4;

for(i=0;i<NUM_VALS;i++)

{

printf("%d ",origList[i]+offsetAmount[i]);

}

printf("\n");

return 0;

}

Explanation:

  • Initialize the origList and offsetAmount variables.
  • Loop up to the value of NUM_VALS variable.
  • Display the output by combining origList and offsetAmount.
5 0
3 years ago
You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
Anvisha [2.4K]

Potential uploaded viruses, personal information being lost, blackmail, identity theft.

7 0
3 years ago
What tools you need to use to migrate Metadata to Two Different Production Orgs?
sammy [17]

Answer:D.

Explanation:I just did this and d is right

8 0
3 years ago
Other questions:
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • True or False. It is required to restart the client computer after the DLP agent has been installed.
    9·2 answers
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • What is a functional simulation?
    14·1 answer
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • Plz help, correct answer will get brainliest (if i can, if i can't ill still rate and give thanks)
    14·1 answer
  • The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!