Explain if a company is responsible for using computer components manufactured using fair trade practices. [9 marks]

Answers

Answer 1

Answer:

Fair trade practices aims at promoting the fair relationships between the buyers and producers. It is a kind of a social movement that makes the producers to provide the better conditions and humane working environment in case of developing countries.

• It also favors and supports the proper and substantial payment to the manufacturers and wages to the labors.

• It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.

Explanation:

can you mark me as brainlist

Answer 2

Answer:

It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.


Related Questions

Compare and contrast the android and windows operating systems

Answers

The main difference between Windows and OS X is the computer you can use it with. OS X is exclusively for Apple computers, commonly known as Macs, while Windows is basically for any personal computer from any company.

Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60

Answers

#include
#include
#include
#include
#include
#include


using namespace std;

// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;

// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};

// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){

// Opening the file
fstream fin;
fin.open(fileName);


// Temp variables
vector list;
vector row ;
string line, word, temp;

// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);

while(getline(s,word,'\t')){

row.push_back(word);

}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}

// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){

// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}


// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();

// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){

// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;

// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);


}

In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

using namespace std;

// Class student required to store the data

class Student{

public:

string lname;

string fname;

int marks[3];

char grade;

// Function which generates the grade for student

void calculate_grade(){

double sum = 0;

for(int i=0;i<3;i++){

sum+= marks[i];

}

double average = sum/3;

if(average>=90 && average<100)

this->grade = 'A';

else if(average>=80)

this->grade = 'B';

else if(average>=70)

this->grade = 'C';

else if(average>=60)

this->grade= 'D';

else this->grade = 'F';

}

};

// This function reads the file , and creates a vector of Students data

vector read_file(string fileName){

// Opening the file

fstream fin;

fin.open(fileName);

// Temp variables

vector list;

vector row ;

string line, word, temp;

// Read the data into vector

while(getline(fin,line)){

row.clear();

stringstream s(line);

while(getline(s,word,'\t')){

row.push_back(word);

}

Student st;

st.fname = row[0];

st.lname = row[1];

st.marks[0] = stoi(row[2]);

st.marks[1] = stoi(row[3]);

st.marks[2] = stoi(row[4]);

st.calculate_grade();

list.push_back(st);

}

fin.close();

return list;

}

// This function takes filname to be output as input, and list of student

void writeFile(string filename, vector list){

// Opening the new file

ofstream fin(filename);

for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"

+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";

fin<

}

// Find the stats required

double average1 =0,average2 =0 ,average3 = 0;

for(int i=0;i average1+=list[i].marks[0];

average2+=list[i].marks[1];

average3+=list[i].marks[2];

}

average1/=list.size();

average2/=list.size();

average3/=list.size();

// Writting the stats

fin<<"\n"<<"Average: "<<"mid_term1 "<

// Closing the file

fin.close();

}

int main(){

// Taking the input

cout<<"Enter the filename: ";

string filename;

cin>>filename;

vector list;

// Reading and Writting to the file

list = read_file(filename);

writeFile("report.txt",list);

}

See more about JAVA at brainly.com/question/2266606

seven characteristics of information ​

Answers

Answer:

1.Accuracy and Precision.

2.Legitimacy and Validity.

3.Reliability and Consistency.

4.Timeliness and Relevance.

5.Completeness and Comprehensiveness.

6.Availability and Accessibility.

7.Granularity and Uniqueness.

Explanation:

#carry on learning

What is it called when a unique letter is assigned to a shared drive

Answers

Answer:

Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.

Explanation:

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

Answers

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete.

CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete. It is the four basic functions of persistent storage.

CRUD operations are foundation operations every database developer and administrator needs to understand.

Find out more on CRUD at: https://brainly.com/question/651396



List and explain three ways study groups benefit your learning.

Answers

Answer:

Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,

1.  More support, limits chances of procrastination

     With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.

2. More people means more parts can get done effectively and taking notes is easier.

     More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.

3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.

      People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.

True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
O True
O False

Answers

Based on computing network operation, it is false that VLANs in cloud computing are most likely to be found on direct connections with a CSP.

What is VLAN?

VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.

Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about VLAN here: https://brainly.com/question/6769174

"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.

Answers


head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.

print("0 through 10 multiplied by 2 and by 10" + "\n")

# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
x = 0
while(x<11):
print(head1 + str(x))
print(head2 + str(x*2))
print(head3 + str(x*10))
x += 1
# Next number.

Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:

Answers

Answer:

#include <stdio.h>  

int main() {  

int p=0, n=0, z=0, inp=0;  

printf("How do I write a C program to read numbers until -1 "  

 "is encountered and also count the number of positive, negative, "  

 "zeroes encountered by users using a while loop?\n\n\n");  

printf("Enter an integer  (-1 to quit): ");  

scanf("%d",&inp);  

while(inp != -1) {  

 if(inp > 0) p++;  

 else if(inp < 0) n++;  

 else z++;  

 printf("\nEnter next integer (-1 to quit): ");  

 scanf("%d",&inp);  

}  

n++; /* -1 is also a -ve number */  

printf("You have entered ...\n");  

printf("\t\tPositive numbers: %d\n",p);  

printf("\t\tNegative numbers: %d\n",n);  

printf("\t\t          Zeroes: %d\n",z);  

}

Explanation:

how to download film​

Answers

Which film are you talking about?
what film are you trying to download from

What was the main limitation of computer networking that the invention of the Robert website of the 1990s

Answers

Answer:

The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.

Write a Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2.

Answers

Answer:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

   print("Equals.")

else:

   print("Unequal.")

Explanation:

The Boolean expression that tests if the value stored in the variable num1 is equal to the value stored in the variable num2 can be found in explanation.

What is boolean expression?

A logical statement that could be either true or false is referred to as a Boolean expression.

As long as both parts of the expression have the same basic data type, Boolean expressions can compare data of any type. Data can be tested to see if it is the same as, greater than, or less than other data.

A Boolean expression is a type of expression used in programming languages that produces a Boolean value when evaluated. A Boolean value can only be true or false.

The boolean expression for the given scenario can be:

num1 = int(input("Enter value: "))

num2 = int(input("Enter value: "))

if num1 == num2:

  print("Equals.")

else:

  print("Unequal.")

Thus, above mentioned is the program for the given code.

For more details regarding boolean expression, visit:

https://brainly.com/question/13265286

#SPJ5

This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI

Answers

C: GUI or Graphical User Interface.
A: Dos is an operating system (MS Dos)
B Fat is a file format for drives
D: Ram is one of the many things that makes a computer work

Answer:

GUI

Explanation:

Which meter would you use to determine which lamp is defective in the shortest possible time? Explain how you would use this meter and why.

Answers

Answer:

bla bla bla bla

Explanation:

I dont anther stand

A(n) __________ is a system where banks in the United States eventually figured out that they could print more __________ than the gold that they had in their vaults.

Answers

Based on the information given regarding money, the correct option will be fractional reserve; paper money.

It should be noted that in the United States, there are banking institutions that hold reserves which is simply the fraction of deposits of other banks.

The fractional reserve is equal to the fraction of the bank's deposit liabilities that are owed to customers.

Therefore, a fractional reserve is a system where banks in the United States eventually figured out that they could print more paper money than the gold that they had in their vaults.

Learn more about money on:

https://brainly.com/question/24556197

Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data

Answers

Answer: D. Digital data

Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.

3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.

Please Help me. Thank You!
Marry Christmas!​

Answers

x = int(input("Enter first number\n"))

y = int(input("Enter second number\n"))

if x > y:

   print(x, "is greater than", y)

elif x < y:

   print(x, "is less than", y)

else:

   print(x, "is equal to", y)

i'm not the greatest coder, but it works :)

Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?

A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();

Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?

A. true
B. false
C. 0
D. 1

Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?

A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)

Answers

Answer:

B, C, B

Explanation:

According to my understanding of these questions, these are in Java.

For the first one, there is a built in function called .length() for a string, so it's answer B.

For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.

The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.

Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that apply.

Answers

It should be noted that data can be secured when working in the following way:

Establishing a cyber security policy.Using two-factor authentication.Keeping passwords strong.Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

https://brainly.com/question/10091405

what was the pascaline used for?​

Answers

Answer:

Math like multiplication, addition, division, and subtraction

Implement a class named BankAccount. Every bank account has a starting balance of $0.00. The class should implement methods to accept deposits and make withdrawals. __init__(self): Sets the balance to 0. deposit(self, amount): Deposits money. Return True if transaction is successful. Return False if amount is less than 0 and ignore the transaction. widthdraw(self, amount): Withdraws money. Return True if transaction is successful. Return False if amount is more than the balance and ignore the transaction.

Answers

The BankAccount class implementation in Python 3.8 is found in the attached image

The deposit method  uses an if statement to check if the amount to be deposited is negative. If so, it does nothing, but returns False signifying that the transaction failed.

However, if the test finds out that the amount to deposit is positive or zero, the deposit method increments the balance, then returns True, signifying a successful transaction.

The withdraw method is similar, but this time, it tests if the amount to be withdrawn is greater than the available balance. If so, it ignores the transaction, and returns False.

If the withdrawal amount is less or equal to the available balance, the withdraw method decrements the available balance, then returns True, signifying a successful transaction.

Learn more about Python programming here https://brainly.com/question/20379340

what is office course
how to learn office course

Answers

Answer:

It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .

Hope this helps you XD ✌️

challenge encountered ​

Answers

Answer:

What challenge?

Explanation:

write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.

Answers

Answer:

Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.

Explanation:

Change up the wording.

During boom times, which of the
following is true?
A. less tax revenue is being paid by businesses
B. less tax revenue is being paid by consumers
C. more tax revenue is being collected from businesses
and consumers
D. tax increases are causing unemployment and job
loss

Answers

During boom times, the option that was true is that less tax revenue is being paid by businesses.

How does the taxation system can boom a economy?

The use of taxation is one that affect incentives, as taxes can influence supply and demand factors.

Note that by lowering marginal tax rates on wages and salaries, can bring about the zeal for people to work more and earn more.

Therefore, During boom times, the option that was true is that less tax revenue is being paid by businesses.

Learn more about  boom times from

https://brainly.com/question/26020324

#SPJ2

what does PR stand for ?

Answers

Answer:

Public Relations or Pull Request (computer programming)

Explanation:

Hope this helps

List the four types of computer cases

Answers

Answer:

full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).

I hope it helps.

This is the answer. Hope it’s helpful

Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.

Answers

According to protocol 4.0, the scenario can be defined in terms of Bob, Alice and Trudy as follows:

The communication is done between Bob and Alice only in whom they share a secret key KAB with each other. The Trudy is an intruder who wants to get the information that is being communicated between Alice and Bob. To do so, Trudy wants Bob to initiate the communication by authenticating herself her Alice. Thus, Trudy waits for the Bob to start in-order to make the Bob authenticate himself.

Here are the steps how the communication is done between the Bob and Trudy:

Step 1: Bob starts the communication by himself to other side and waits for the reply.

Step 2: Trudy starts to disguise as Alice herself and authenticate herself to Bob.

Step 3: After looking at the reply, Bob sends the nonce key to Trudy. At this step, still Trudy does not know the KAB(R) in-order to reply to Bob.

Step 4: At this point Trudy response to the step-1 while Bob still continuing to authentication. Trudy picks the nonce for the Bob to encrypt the message with the Bob sent nonce in the Step-3.

Step 5: Now Bob completes his own authentication to himself on the other side of encrypting the nonce he sent at step 4. Where, Trudy gets the nonce key KAB( R).

Step 6: Now, Trudy completes her authentication in responding to R that is sent by Bob in step 3. At this point, Trudy has responded properly, so Bob thinks that he is communicating with Alice(Trudy).

The actual scenario with respect to above steps, the communication is done as follows:

Bob: “I am Bob”

Trudy: “I am Alice”

Bob: “R”

Trudy: “R”

Bob: “KAB (R )” – Bob completes his authentication.

Trudy: Get the KAB (R ) – Trudy complete her authentication.

Thus, the communication is started between the Bob and Trudy instead of Bob and Alice according to protocol 4.0.

What type of system software manages memory?

Answers

Answer:

"Operating System"

Explanation:

The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.

What is system software?

The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.

You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.

Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.

Therefore, an operating system is a sort of system software that controls memory.

To learn more about system software, refer to the link:

https://brainly.com/question/12908197

#SPJ2

When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation

Answers

There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called  Dayton.

Wildcard  is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.

Some wildcards are;

The asterisk (*)The question mark (?) Percent ( % )

Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.

Learn more about Wildcard  from

https://brainly.com/question/7380462

Other Questions
How would the expression x3 -3 sqrt 3 be rewritten using difference of cubes?O A. (x- 13 )(x2-3x - 3)O B. (x+ 3)(x + 13 x + 3)C. (x - 13 )(x2 + 3x + 3)O D. (x- vb)(x2 + v3 x+3) The collection of ____ bits make one nibble 7. Why would it be inaccurate to describe Rigoberta Menchu as mute about thesuffering of the Guatemalan people? the sum of two numbers x and y is 18 and their difference is 14. how is that written as an equation the highest risk of earthquakes in the united states is along the west coast Complete the sentences. Use used to where possible. ( make, watch, play, hate, go ) 1. She...........vegetables, but now she likes them. 2. I....... a lot of TV last week because I was sick. 3. We........to the movies, but now we're too busy. 4. Yesterday, he........a cake for my birthday. please help will brain list if correct no links please Explain how Johnson responded to these laws? pleeease help!!!!!.... Help please with these solutions Alan bought a new car. The total amount he needs to borrow is $55,498. He plans on takingout a 5-year loan at an APR of 4.21%. What is the monthly payment? What does the N stand for in proven method of evaluating sources help fast it due at 11pm Which Boston lawyer defended the British soldiers put on trial after the Boston Massacre?Paul RevereSam AdamsJohn AdamsJohn Hancock Sally is solving the linear equation 13 + 4x - 9 = 7x + 7 - 3x. Her final two steps are:4 + 4x = 4x + 74 = 7Select the statement that correctly interprets Sally's solution.Lesson Link1 The solution is x = 0.2 The solution is the ordered pair (4,7).3 There is no solution since 4 = 7 is a false statement.4 There are infinitely many solutions since 4 = 7 is a false statement.aEnter the answer number! Clear-cutting forests and draining marshes contribute to a reduction in many plants and animal populations because these practices?poison the soil.destroy habitats.pollute water supplies.introduce enemy species. Hebrews begins by asserting that jesus is greater than. third person 2. It is a cool, cloudy morning. Bella wants to go out for jogging. But as thesky darkens she decides to stay and just exercise using a Zumba video. She tells herself, "I don't want to get wet under the rain when I sweat a lot." A first person B. second C. third person person Peaking at 14 to 15 years of age,_____executive function includes psychological processes driven by emotion, with emotion regulation an especially important process Which of the following men supported u. S expansionism in the pacific?.