subject
Social Studies, 14.07.2019 21:00 1129682

Ruby and daniel are close friends and share their innermost thoughts and secrets with each other. they both experience warmth toward each other that arises from feelings of closeness and connectedness. ruby and daniel's relationship, however, lacks passion and long-term commitment. in the context of sternberg's triangular theory of love, ruby and daniel's relationship can best be termed:

ansver
Answers: 1

Another question on Social Studies

question
Social Studies, 21.06.2019 21:30
The owner of a one-acre parcel of land with a small house on it rented the property to a professor of a nearby college at a monthly rental of $500. several years later, after the professor got tenure, the parties orally agreed that the professor would purchase the property from the owner for the sum of $60,000, payable at the rate of $500 a month for 10 years. they agreed that the owner would give the professor a deed to the property after five years had passed and $30,000 had been paid toward the purchase price, and that the professor would execute a note secured by a mortgage for the balance. the professor continued in possession of the property and made all monthly payments in a timely fashion. when he had paid $30,000, he tendered a proper note and mortgage to the property owner and demanded that she deliver the deed as agreed. the owner refused because valuable minerals had been discovered on adjacent parcels in recent months, causing the value of this parcel of land to increase to 10 times its former value. the professor brought suit against the property owner for specific performance. if the court rules in favor of the property owner, what is the likely reason?
Answers: 2
question
Social Studies, 22.06.2019 07:20
Based on your approved case, create fictitious digital evidence. you may use logs from your own computer (no personal information) as a guide or search the internet for samples. these samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference. document who, when, and how the evidence was obtained. remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. if necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation. digital evidence must meet each of the following criteria: some of your digital evidence must be retrieved by computer forensics. some of your digital evidence must be retrieved from log files. digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed. present digital copies of your evidence in text files, screen shots, or pdfs.
Answers: 3
question
Social Studies, 22.06.2019 08:00
What are three voluntary behaviors that is not control by results?
Answers: 1
question
Social Studies, 22.06.2019 18:00
What has contributed to the growth of agriculture as big business in the midwest
Answers: 1
You know the right answer?
Ruby and daniel are close friends and share their innermost thoughts and secrets with each other. th...
Questions
question
History, 01.03.2021 22:30
question
Advanced Placement (AP), 01.03.2021 22:30