distinguish between the following terms that relate to conflict: conflict avoidance, conflict confrontation,conflict resolution​

Answers

Answer 1

Answer: See explanation

Explanation:

Conflict is when there's disagreement or dispute between people.

Conflict avoidance: Conflict avoidance occurs when an individual avoids reacting to a conflict. In this case, the individual doesn't confront the issue but rather avoids it. This can be done by ignoring the subject or not speaking about it anymore.

Conflict confrontation: This is the opposite of conflict avoidance. In this case, the involved individuals confront each other. This brings about exchange of words or physical behavior.

Conflict resolution: Conflict resolution occurs when there's a peaceful resolution to the dispute between the parties involved. Some of the strategies used include compromise, avoiding, collaborating etc.

Answer 2
What is conflict?

Conflict refers to disagreement between two or more people which is as a result of differences in opinion or belief.

Forms of conflict are :

Conflict avoidance: Conflict avoidance occurs when an individual avoids reacting to a conflict. Here, the individual doesn't confront the issue but instead completely avoid. This type of conflict can be done by ignoring the subject matter or not talking about it again.

Conflict confrontation: This is the direct opposite of conflict avoidance. Here, individuals involved confront each other. This brings about exchange of words or physical behavior.

Conflict resolution: Conflict resolution occurs when there is a means to resolve dispute among the parties involved in such dispute. Some of the strategies that can be used are compromise, avoiding, collaborating etc.

Learn more about conflict here : https://brainly.com/question/24769299


Related Questions

What is the pest analysis of Apple?

Answers

Political, economic, social, technical, environmental, and legal (PESTEL) variables are a strategic analysis tool.

The PESTEL (or PESTLE) study of Apple examines the possible effects of these variables on the company's financial position and long-term growth prospects. Apple's PESTLE Analysis looks at the numerous external factors—political, economic, social, and technological—as well as the legal and environmental ones—that have an influence on its operations. The PESTLE Analysis emphasises the various extrinsic circumstances that have an influence on the brand's business. Finding the local and global political, economic, social, and technical aspects that have an impact on supply chains is done through a PEST study. 20-Jun-2017

To learn more about PESTEL click the link below:

brainly.com/question/28310527

#SPJ4

1. What is used to change the appearance of a cell's value based on parameters set by the user?

Answers

conditional formatting

When the gate of a n type transistor is supplied with O volts, the n type transistor acts like a unstable circuit O open circuit O tristate circuit closed circuit

Answers

When the gate of an n-type transistor is supplied with 0 volts, it acts as an open circuit.

What is the behavior of an n-type transistor when the gate is supplied with 0 volts?

When the gate of an n-type transistor is supplied with 0 volts, the transistor acts like an open circuit. In an n-type transistor, the gate is the control terminal that determines the conductivity of the channel between the source and drain.

When the gate voltage is 0 volts, it means that no voltage is applied to the gate terminal. In this state, the transistor does not conduct current and behaves as if there is an open circuit between the source and drain terminals.

An open circuit means that there is no complete path for the current to flow through. In the case of the n-type transistor, when the gate voltage is 0 volts, the transistor does not provide a conducting path for the current to flow between the source and drain terminals.

Therefore, the transistor acts as an open circuit, and no current flows through it.

Learn more about gate

brainly.com/question/18430820

#SPJ11

Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character from Riverdale

Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character
Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character
Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character
Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character
Who watches Riverdale ? if you do can we be friends(pLEASE DON'T DELETE) and also who is your fav character

Answers

Answer:

I have watched it before

Answer:

my fav is veronica lol

Explanation:

One the line below, Write the macimum number of columns you can sort by in the sort dialog box

Answers

Answer:

64

Explanation:

You can sort by up to 64 columns. Note: For best results, the range of cells that you sort should have column headings.

What is the 3 tier architecture made of?

Answers

Answer: The 3 tier architecture is made up of three layers: the presentation layer (or user interface layer), the business logic layer (or application layer), and the data access layer (or data layer). The presentation layer is responsible for displaying data and communicating with the user. The business logic layer contains the business rules and logic that drive the application. Finally, the data access layer is responsible for connecting to the database and executing database queries.

Explanation:

Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.

Answers

\( \implies \huge \tt \underline \red{answer}\)

Hlo

Go to the Adela Condos worksheet. Michael wants to analyze the rentals of each suite in the Adela Condos. Create a chart illustrating this information as follows: Insert a 2-D Pie chart based on the data in the ranges A15:A19 and N15:N19. Use Adela Condos 2019 Revenue as the chart title. Resize and reposition the 2-D pie chart so that the upper-left corneçuis located within cell A22 and the lower-right corner is located within chil G39.

Answers

The purpose of creating the 2-D Pie chart is to visually analyze the revenue distribution of each suite in the Adela Condos, providing insights into rental performance and aiding in decision-making and strategic planning.

What is the purpose of creating a 2-D Pie chart based on the Adela Condos rental data?

The given instructions suggest creating a chart to analyze the rentals of each suite in the Adela Condos. Specifically, a 2-D Pie chart is to be inserted based on the data in the ranges A15:A19 and N15:N19.

The chart is titled "Adela Condos 2019 Revenue." To complete this task, you will need to resize and reposition the 2-D pie chart. The upper-left corner of the chart should be within cell A22, and the lower-right corner should be within cell G39.

By following these instructions, you can visually represent the revenue distribution of the Adela Condos rentals in 2019. The 2-D Pie chart will provide a clear representation of the proportions and relative contributions of each suite to the overall revenue.

This chart will be a useful tool for Michael to analyze and understand the revenue patterns within the Adela Condos, allowing for better decision-making and strategic planning based on rental performance.

Learn more about Pie chart

brainly.com/question/9979761

#SPJ11

What is the output for the following portion of a program? Assume the user enters 162.5.
strWeight = input("Enter your weight in pounds: ")
weight = float(strWeight)
print (weight)
162.5
O 162
O 163
O An error occurs.

Answers

If the user enters 162.5, the output will be 162.5

Answer:

162.5

Explanation:

just took this on edge. have a good one!

Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be described as a single or even two genres. Can tou think of any genres that should be invented? worth 100 points​

Answers

There are games that cannot be described as a single or two genres.Yes there should be some genres invented.Because games are now become a everyday requirement for entertainment .

Uses of genre:-

Genres are used in Readers as well as writers. By using genre patterns in writers it has been accepted by readers for accomplishing their purposes.Genres allow both writers and readers to establish a working relationship between each other.Both writers and readers are required for gamers and game publishers.So Genres are very useful to them.

an organization plans to encrypt data in transit on a network. which aspect of data is the organization attempting to protect

Answers

The organization is attempting to protect the confidentiality and integrity of data during its transmission over the network by encrypting it. Encryption is a process that converts data into a secure and unreadable format using encryption algorithms and keys. This ensures that even if an unauthorized person intercepts the data, they will not be able to understand or tamper with it.

By encrypting data in transit, the organization can safeguard sensitive information such as passwords, financial details, and personal data from being accessed or modified by unauthorized individuals. This helps to prevent unauthorized access, data breaches, and information leaks.

Encryption works by applying a mathematical algorithm to the data, transforming it into an unreadable form called ciphertext. Only authorized individuals with the correct decryption key can decrypt the data back into its original format, known as plaintext. This ensures that only authorized parties can access and understand the data, adding an extra layer of security to the network communication.

To know more about organization visit:

https://brainly.com/question/12825206

#SPJ11

The sensory media through which messages are sent and received are _____________________.

Answers

Answer:

SMS

Explanation:

Write 2-4 short & energetic sentences to interest the reader! Mention your role, experience & most importantly - your biggest achievements, best qualities and skills about data entry.

Answers

Searching for an information section genius? Look no further! With north of 5 years of involvement and a 99.9% precision rate, I'm the ideal possibility for your information passage needs. My scrupulousness, speed, and proficiency will guarantee that your information is precisely and productively entered, like clockwork. We should cooperate to make your information passage calm!

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

Using the drop-down menu, complete these sentences to describe algorithms. Algorithms are instructions to solve a problem. Algorithms are when written in a programming language. Algorithms are step-by-step instructions for or to follow to solve a problem. Programmers use algorithms to and .

Answers

Answer:

Algorithms are instructions to solve a problem

Explanation:

Answer:

1. step by step

2. computer programs

3. a person

4. a computer

5. solve logic problems

6. start writing new programs

Explanation:

i just did it and got them all right

1. The supervisory software of a computer is called _____ (a) operating system (b) high – level language (c) transistor

Answers

Answer:

a

Explanation:

Who has gotten a random file link from someone? What file does it contain?

Answers

Answer:

those are bots , just report those

Explanation:

I got it but I didn’t download it cuz it looks sketchy he literally posted that same link to everyone who has made a question so I would advise not to download it

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

suppose the following values are added to an empty avl tree in the order given: 1, 12, 31, 35 and 40, what is the value of the left child of 35?

Answers

The left child of the node with value 35 in an AVL tree with the values 1, 12, 31, 35, and 40 is 12. This is due to the AVL tree's self-balancing property, which ensures that the balance factor of any node is always -1, 0, or 1.

After adding the values 1, 12, and 31 to the empty tree, the balance factor of the node with value 35 is 0 and thus, it has two children: the left child has the value of 12, and the right child has the value of 31.

A cross-platform, open-source server environment called Node.js can be used with Windows, Linux, Unix, macOS, and other operating systems.

For more such questions on node

https://brainly.com/question/20058133

#SPJ11

PLS HELP I HAVE 1 MINUTE LEFT!!! 50 POINTS Which statements are accurate? Select three options.
The more switches you have, the more 1s and Os you get.
The more switches you have, the smaller the bits can be.
The more switches you have, the more complex the data can be.
The more switches you have, the more bits you can have.
The more switches you have, the fewer bits you can have.

Answers

Answer:

MORE BITS

Explanation:

You are considering two different facial cosmetic surgeries

Answers

The two different facial cosmetic surgeries being considered are not specified in the question, so I am unable to provide a specific answer.

However, when considering any cosmetic surgery, it is important to thoroughly research and consult with a qualified medical professional. Factors to consider may include the desired outcomes, potential risks and complications, recovery time, cost, and personal preferences. It is advisable to gather as much information as possible, seek multiple opinions, and make an informed decision based on individual needs and goals.

Learn more about specific  here;

https://brainly.com/question/27900839

#SPJ11

What is the difference between machine learning and artificial intelligence

Answers

Answer:

Artificial Intelligence is the broader concept of machines being able to carry out tasks in a way that we would consider “smart”. ... Machine Learning is a current application of AI based around the idea that we should really just be able to give machines access to data and let them learn for themselves.

WILL MARK AS BRAINLIEST FOR PAPER ASAP PLEASE HELP

Research and write a 3-to-5-page paper, giving examples to support the following concepts we learned in this lesson:

pseudo code
code blocks
variable scope

Answers

Pseudo code is a type of informal language that is used to express the logic of a computer program in a human-readable format. It is often used to plan out a program before it is actually written in a programming language. Pseudo code typically uses simple words and phrases to express the logic of a program, making it easy to understand for both programmers and non-programmers.

An example of pseudo code to find the average of three numbers might look like this:

1. Start

2. Input num1, num2, num3

3. Set sum = num1 + num2 + num3

4. Set avg = sum / 3

5. Print avg

6. End

Code blocks are a set of instructions that are executed together as a unit. They are typically used to group related instructions together and make it easier to understand the flow of a program. In many programming languages, code blocks are defined by curly braces {} or indentation.

An example of a code block in Python to find the sum of two numbers might look like this:

x = 5

y = 7

def add_numbers(x, y):

   sum = x + y

   return sum

result = add_numbers(x, y)

print(result)

Variable scope refers to the region of a program where a variable can be accessed. In programming, variables can have either global or local scope. Global variables can be accessed by any part of the program, while local variables can only be accessed within the code block where they are defined.

An example of variable scope in Python might look like this:

x = 5

def print_x():

   x = 3

   print(x)

print_x()

print(x)

In this example, the variable x is defined as a global variable with a value of 5. Within the code block of the function print_x(), a local variable x is also defined with a value of 3. Within the function, the local variable x is printed and the global variable x is not affected. But outside the function, the global variable x is printed and its value is still 5.

It's important to note that the concept of variable scope is present in almost all programming languages and the specific syntax and semantics may vary from one language to another.

Code blocks are a fundamental concept in programming, as they are used to group related instructions together and make it easier to understand the flow of a program. They are typically defined by curly braces {} or indentation, and can be used to organize code into functions, loops, or conditional statements. For example, in C-like languages, a loop can be defined as a code block like this:

for(int i=0; i<10; i++){

   printf("Hello World!\n");

}

In this example, the code inside the curly braces is executed as a block, it will print "Hello World!" ten times.

Pseudo code is a way to express the logic of a program in a human-readable format, making it easy to understand and plan out a program. It uses simple words and phrases to express the logic of a program, making it easy to understand for both programmers and non-programmers. For example, a pseudo code for a program that prints out the first n prime numbers would look like this:

1. Start

2. Input n

3. Set count = 0

4. Set i = 2

5. While count<n

6.  for j=2 to i-1

7.  If i is divisible by j

8.   break

9.  If j is equal to i-1

10.  print i

11.  count = count+1

12. i = i+1

13. End

14. End

This pseudo code is easy to understand and gives a clear understanding of the overall logic of the program, making it easier to convert the pseudo code into a specific programming language.

It's important to note that while the syntax of pseudo code may vary, it's main goal is to convey the logic of the program in a way that can be understood by anyone who is familiar with the problem domain and the general concepts of programming.Variable scope is an important concept in programming as it determines the region of a program where a variable can be accessed. In general, there are two types of variable scope: global and local.

In conclusion, pseudo code, code blocks, and variable scope are all important concepts in programming. Pseudo code is a way to express the logic of a program in a human-readable format, making it easy to understand and plan out a program. Code blocks are used to group related instructions together and make it easier to understand the flow of a program. Variable scope determines where a variable can be accessed within a program, with global variables being accessible by any part of the program and local variables being accessible only within the code block where they are defined. Understanding these concepts and using them effectively can greatly improve the readability and maintainability of a program.

PLEASE ASAP!!

Today, most film editors manually cut and splice the actual film footage once it arrives.


O True
O False

Answers

The correct answer should be true, as their job is to *edit* the footage.

Answer:

True

Explanation:

edg2021

The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task

Which of the following actions is most likely to raise legal or ethical concerns?
A
An analyst writes a program that scans through a database of open-access scientific journals and creates a document with links to articles written on a particular topic.
Sut
B
A computer scientist adds several features to an open-source software program that was designed by another individual.
с
A musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song.
D
A public interest group alerts people to a scam that involves charging them for a program that is available for free under a Creative Commons license
Q

Answers

Answer:

C. A musician creates a song using samples of a work and then uses a Creative Commons license to publish the song.

Explanation:

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work. The copyright law which protects the sharing and downloading rights of music is known as the Digital Millennium Copyright Act (DMCA).

Furthermore, an intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence.

In this scenario, a musician creates a song using samples of a copyrighted work and then uses a Creative Commons license to publish the song. This is an action that is most likely to raise legal or ethical concerns because he didn't get a license from the other musicians who he used their work.

A Creative Commons license is simply a public copyright license that allows for the free distribution of a copyright protected material and it can only be used by the intellectual property owner.

Describing How to Create a Combination Chart
Select the correct navigational path to create a combination chart
Select the chart
Click the Chart Tools
tab
Select the data series from the Chart Area list.
Click the Chart Tools
tab
Click Change Chant Type.
Choose a chart type for the selected data series and click OK.

Answers

Answer:

format and design

Explanation:

i took test

Response time on the website that hosts the online version of your productcatalog is getting slower and slower. Customers are complaining that theycannot browse the catalog items or search for products. What type of attackdo you suspect

Answers

Based on the information provided, the type of attack that you can suspect is a Denial of Service (DoS) attack.

A Denial of Service (DoS) attack is a type of cyber attack in which a perpetrator aims to make a system unavailable for its users by overloading it with massive traffic or by causing it to crash or malfunction.

In this scenario, the response time on the website that hosts the online version of the product catalog is getting slower and slower, and customers are complaining that they can't browse the catalog items or search for products.

This indicates that the website is not functioning correctly, and the attack is probably preventing customers from accessing the site by causing it to overload and crash.Therefore, the type of attack that can be suspected is a Denial of Service (DoS) attack.

Learn more about DoS attack at:

https://brainly.com/question/13068589

#SPJ11

If others have read access to your calendar, what should you do to prevent them from seeing the details of a particular event?

Mark the event as Free so they will not see the event at all.
Mark the event as Busy so they know how long you are out.
Mark the event as Tentative so they may not know where you are.
Mark the event as Private so they will only see that you are not available.

Answers

Answer: mark the event as private so they will only see that you are not available.

Explanation:

Answer:

D. Mark the event as Private so they will only see that you are not available.

Explanation:

A homeowner is planning to use carpet tiles to cover the floor of a room measuring 9 feet by 10 feet 8 inches. If the carpet tiles are 8 inches wide and 1 foot long and there are no gaps between the tiles as they are placed on the floor, how many carpet tiles will the homeowner need to cover the floor of the room?​

Answers

If the carpet tiles are 8 inches wide and 1 foot long, and there are no gaps between them as they are placed on the floor, the homeowner will need 144 carpet tiles to cover the floor of the room.

Given room dimensions of 9feet*10feet 8inch

tile dimensions of 8inch*1foot,

we can calculate

the number of tiles required. 1 foot=12 inch

number of tiles=area of room/area of tiles

               =(9*12)inch*(12*10+8)inch/8inch *12 inch

               =144

A homeowner is someone who owns a house or apartment in which they live.

This is the most common written policy for a homeowner, and it is intended to cover all aspects of the home, structure, and contents.

Most homeowner policies include replacement cost coverage for the home and actual cash value coverage for personal property.

A homeowner is someone who owns a house or apartment in which they live.

Learn more about homeowner here:

https://brainly.com/question/15243238

#SPJ4

what are the rules that help ensure the quality of data? relational integrity constraints data integrity integrity constraints business-critical integrity constraints

Answers

The rules that help ensure the quality of data are relational integrity constraints, data integrity, integrity constraints, and business-critical integrity constraints.

To ensure data quality, there are a set of rules that are required to be followed. These rules are as follows:Relational integrity constraints: Relational integrity is the assurance of the correctness and consistency of the data in the database. Data should have logical relationships between the tables to ensure that each table has a unique identifier. Data integrity: Data integrity refers to the accuracy, consistency, and reliability of the data. Data must be checked for integrity before it is entered into the database. Integrity constraints: Integrity constraints are rules that are defined to ensure the accuracy and consistency of the data. These rules are defined to prevent the entry of incorrect data or data that violates the logical relationships between the tables in the database. Business-critical integrity constraints: These are constraints that are defined to ensure the accuracy and consistency of the data that is critical to the business.

Learn more about integrity constraints: https://brainly.com/question/28026113

#SPJ11

Other Questions
which of the relations represent y as a function of x As explained in the first chapter, a theme is a main message or moral that the author of a work wants readers to understand, accept, or consider. The Crucible has several different themes; while literature can mean different things to different people, there are messages within the play that most people agree to be significant. After reading the play, answer the question below.Correct Answer1.Place a check mark next to each theme from the play: How long is 75% of a 24-hour day? In primates, male and female reproductive strategies are Group of answer choices similar. shaped by resource competition in females and sexual competition in males. shaped directly by food acquisition strategies in both sexes. shaped directly by sexual competition in both sexes. Which country is farthest north? a) norway c) iceland b) finland d) ukraine In a quadrilateral ABCD , AB = BC and CD = DA . Then , the quadrilateral is a :a) Parallelogram b) Rhombus c) Kited) Trapezium Write a short paragraph of 50 words on beehive and wax one number is 7 more than another.three times the smaller number increased by four times the larger number is 63. what is the larger number? 5. Estimate:$53X 4+what do I addMath Which story idea best fits the traditional definition of tragedy? A. A doctor does everything right but still manages to loseone of her patients.O B. A football coach is fired because his drive to winendangers his players.O c. A general attempts a desperate attack on an enemyposition but is defeated.D. An old woman is careful to wrap up all her affairs in lifebefore her death. how did industrialization change the world ? WHY DO ACTIVISTS BELIEVE THE ECONOMY'S SELF CORRECTING MECHANISMIS SLOW? 20 marks. bonjour , c'est a rendre pour demain , pourriez vous m'aider ? 2x+y=16 y=2x what are the side lengths of the triangle? Using Riemann sums with four subdivisions in each direction, find upper and lower bounds for the volume under the graph of f(x,y)=8+3xy above the rectangle R with 0x3,0y5. upper bound = lower bound = For this testable question write a proper hypothesis and identify the variables.A truck driver wants to find out if there is any relationship between the amount of gas he uses per kilometer and the speed that he's going. Sales man is paid 5% of his sales as commission. His sales for last month were 2020. How much commission was he paid Carters of a party make a punch with 12.75 L of grape fruit juice, 8.32 L of sparkling water and 14.25 years of orange juice the cups for serving the punch comes in to size is 0.5 L and 0.8 L there are 50 of the 0.5 Liter cups and 10 of the 0.8 Liter cups If each cup is used only ones do they have enough cups to serve all of the punch Complete these:1.A square is a polygon with _ equal sides 2.All the sides are _ 3.They measure _ degrees each4.A rectangle is a polygon with _ opposite side 5. There are _ sets of parallel lines6.A parallelogram has opposite sides Question 15Tools ->>>RII PauseQuestion 15Which point on the number line is closest to 130?2022 Muminate Education, Inc.Q ZoomH511678189PQ10 11RS12