1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
3 years ago
6

A person who is especially motivated to avoid harm

Social Studies
1 answer:
Whitepunk [10]3 years ago
6 0
The answer i got was B. Is engaging in promotion focus.
You might be interested in
The difficulty that arises when the same social position imposes conflicting demands and expectations is known as
goldenfox [79]

The answer is: Role Strain

Example of this would be when a supervisor of a company is dating her co- workers.

In such situation, she has two different roles. One is as a boss that has to be strict and have a set of expectation that must be fulfilled by employees.  On the other hand, she is also a girlfriend that has to give a full support to his loved one.

When her boyfriend make a mistake in the office, it could create a confusion for her since she's unsure which role she need to assume to deal with it.

4 0
3 years ago
The United States went through an economic ________ after the American Revolution
andriy [413]

Answer:

depression

Explanation:

4 0
3 years ago
Which had three main periods of conflict?
blsea [12.9K]

Answer:

Seminole Wars as far as I am concerned

Explanation:

4 0
3 years ago
What famous ruler of Mali is known for his pilgrimage to Mecca? Mansa Musa Sundiata Keita Sakura Al-Sahili
dsp73
The answer is Mansa Musa. 
Hope this is helpful. :)
6 0
3 years ago
Read 2 more answers
When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was establ
wolverine [178]

Answer:

Trojan horse

Explanation:

Trojan horse -

It is a type of malware , which is in the form of some authorised software , is referred to as trojan horse.

This type of virus is used by the hackers in order to access not other person's computer .

It is a illegal practice, the trojan horse is capable of modifying any data , copying the data , blocking data and deleting the data.

Hence, from the question, the arcade game is a trojan horse.

8 0
3 years ago
Other questions:
  • Couples who cohabitate before marriage are ______ couples who did not cohabitate before marriage to be married at least ten year
    9·1 answer
  • Amanda needs to buy a new car for work. She has one day to find a car and was able to read only one article about new cars befor
    15·1 answer
  • Louis Pasteurs research contributed to life during the industrial revolution?
    5·2 answers
  • What is the united states' largest river
    8·2 answers
  • HELP PLEASE!!
    11·2 answers
  • Name the first supreme court cases the supreme court case summary
    13·1 answer
  • In colorado v. connelly (1986), scotus considered the case of a mentally ill man who approached an officer on the street and con
    15·1 answer
  • A student chemist created the following model to explain a phase change they observed at home: A chocolate bar was placed in a h
    11·1 answer
  • What are the causes for increase in green house gases​
    7·1 answer
  • In a county commissioner form of government, the state government has: a. significant authority over legislative decisions . b.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!