Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.

You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?

Answers

Answer 1

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.


Related Questions

class Main {

static void printPowers(int howMany, int nrRows) {

int n=1;

while(n<=nrRows) {

int power = 1;

while(power <= howMany) {

System.out.printf("%d ", (int) Math.pow(n,power));

power++;

}

System.out.println();

n++;

}

}



public static void main(String[] args) {

printPowers(3,5);

}

}
1. Rewrite your method printPowers from 7B to use a for loop instead of a while loop.

2. Rewrite your method printPowers from 7B to use a do-while loop instead of a while loop.

Answers

Answer:

class Main {

 static void printPowers(int howMany, int nrRows) {

   for(int n=1; n<=nrRows; n++) {

     for(int power = 1; power<=howMany; power++) {

       System.out.printf("%d ", (int) Math.pow(n, power));

     }

     System.out.println();

   }

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

class Main {

 static void printPowers(int howMany, int nrRows) {

   int n = 1;

   do {

     int power = 1;

     do {

       System.out.printf("%d ", (int) Math.pow(n, power));

       power++;

     } while (power <= howMany);

     System.out.println();

     n++;

   } while (n <= nrRows);

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

Explanation:

The for loop gives the cleanest, shortest code.

Why do we need to use a VPN service?

Answers

Answer:

VPN creates a private tunnel so hackers, your ISP, and the government can't see what you're doing.

Answer: VPN stands for Virtual Private Network. It is a tool that is used for securing the user's internet journey.

Explanation:

Through encryption, a VPN keep safe the internet traffic of the users. For the best VPN service, you must try CovermeVPN that ensures high speed and the highest security.

If you are an Indian, know why CovermeVPN is best VPN for India.

Source:

https://covermevpn.com/best-vpn-service-in-india-for-pc-mobile-and-other-devices/

I am trying to make a flowgorithm chart for a dogs name, age, weight and when their weight is less than 50 OR more than 100 its output is the dogs name. I also need to include a sentinel value to end the program. For some reason I cannot share my screen or upload a file of what I completed. I really want to get past this assignment as I have already been working on it for several days. PLEASE HELP

Answers

Answer:

i think it helps

Explanation:

sorry there was someone else rude as heck messaging and responding I couldn't see their screen name

what isig naame

oh okay

I have sent dm

i dont know your name there

TQ Automation
What is Robotic Process Automation (RPA)?

Answers

Answer:

RPA or Robotic Process Automation allows organizations to automate tasks which human beings were doing across any applications and systems. The purpose of RPA is to transfer the execution of the process from humans to robots.

I have a project management class and my professor wants 15-20 page project plan. Any suggestions anyone ?

Answers

A project plan  helps to establish all work in a project as well as  identification of  who will do it.

What is a project plan?

It should be noted that i just give the general overview about a project plan.

Project plan  can be regarded as the project goals as well as the  objectives and the specifies tasks , it helps to establish how goals will be achieved along with the needed resources.

These steps can be followed in writing a project plan:

Establish Project Scope as well as the  Metrics.Establish the  Stakeholders. Develop Tasks. Make sure you Assign Tasks as well as  Deadlines. Seek for Feedback so as to be able to  Adjust The Project PlanGet  relevant Team Involved In the Process.

Learn more about project plan  on:

https://brainly.com/question/15410378

#SPJ1

Fill in the blanks to help write this professional e-mail:



✔ Hello Design Team,

You may have heard, I am meeting with the VP (Vice-President) of Finance to highlight our team’s work on the Big Project.
✔ I’d like to show our best work to the VP, which is why I am asking for your help now.

I want to have a slideshow of our best designs to present.
✔ Please send me final versions of your best work so I can create the presentation.


✔ Thanks for your support!

Jan, Team Lead

Answers

The Fill in the blanks of this professional e-mail is given below:

What is the email about?

The Team Lead,

Dangete group.

To Design Team,

                    Email on project presentation

You may have heard, I am meeting with the VP (Vice-President) of Finance to highlight our team’s work on the Big Project. There we are going to talk about all the work that the team members can do and have done.

I’d like to show our best work to the VP, which is why I am asking for your help now. I want to have a slideshow of our best designs to present.

This will be presented when he comes to visit and as such, Please send me final versions of your best work so I can create the presentation. I trust you all and i know you are have been giving your best for the company's growth.

Thanks for your support.

Yours faithfully,

Jan Gith,

Team Lead

Learn more about  Design Team from

https://brainly.com/question/25886641

#SPJ1

give two logics how a computer is better then man how give two logic how give two logics ​

Answers

Answer:

makes work easier

saves time

Why should you make sure the paper being used in a printer is dry and not damp?

Answers

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

We have,

Using dry paper in a printer is important because damp or wet paper can cause several issues:

- Ink Absorption and Smudging: Damp paper can absorb ink unevenly, leading to smudging, bleeding, and blurred printouts. The ink may not dry properly on damp paper, affecting the print quality.

- Paper Jam: Wet or damp paper can stick together or to printer rollers, increasing the likelihood of paper jams. This can damage the printer and disrupt the printing process.

- Curling and Wrinkling: Moisture can cause paper to curl, warp, or wrinkle, making it difficult to feed through the printer's mechanisms properly. This can result in misaligned printing and paper feeding issues.

- Print Quality: Wet or damp paper can affect the color saturation and clarity of the printouts, resulting in poor print quality and reduced legibility.

- Drying Time: If the paper is wet, it will need time to dry before it can be used in the printer. Printing on wet paper can result in a smeared or faded appearance due to the ink's interaction with moisture.

- Overall Printer Health: Consistently using damp paper can lead to printer damage over time, affecting various components like rollers, cartridges, and print heads.

Thus,

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

Learn more about printers here:

https://brainly.com/question/5039703

#SPJ3

How does block chain support data privacy?

Answers

Answer:

Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.

Explanation:

hope it helps you

write a program to calculate the average of all even integers between 1 and 10000

Answers

We can calculate average by adding each even numbers till n and then dividing sum by count.

The Python program to calculate the average of all even integers between 1 and 10000 is given below.

We have,

The Python program to calculate the average of all even integers between 1 and 10000:

def main():

   even_sum = 0

   count = 0

   for num in range(2, 10001, 2):  # Starting from 2 and incrementing by 2 (only even numbers)

       even_sum += num

       count += 1

   if count > 0:

       average = even_sum / count

       print("Average of even integers between 1 and 10000:", average)

   else:

       print("No even integers between 1 and 10000.")

if __name__ == "__main__":

   main()

In this program, we define a function main() that runs the main logic.

We initialize even_sum to store the sum of even numbers and count to keep track of how many even numbers we encounter.

The for loop iterates through even numbers between 2 and 10000 (using the range() function with a step of 2).

Inside the loop, it adds each even number to even_sum and increments the count.

Thus,

The Python program to calculate the average of all even integers between 1 and 10000 is given above.

Learn more about Python programs here:

brainly.com/question/32674011

#SPJ3

Explain three ways for the attacker to avoid raising alarms from intrusion detection systems.

Answers

IDS or Intrusion detection system is very powerful but clever attack can make it reckless

#1

Use Insertion attack

It generally denotes to sending dummy intruders in multiple amount the IDS gets confused and attacker can go

#2

Using codewords or doing encoding and decoding(Obfuscating)

Its very useful technique

#3

Using shell codes

IDS will be failed if you successfully implement it

The three ways for the attacker to avoid raising alarms from intrusion detection systems are

Explanation:

Session splicing and fragmentation - involve breaking, slicing, and splitting packets into multiple pieces such that no single packet causes the IDS to trigger an alert.

Invalid packets - Sending invalid TCP packets is another way of evading an IDS.

Polymorphic shellcodes -Most IDS systems have a standard default set of intrusion signatures. Attackers can modify the attack payload so that it doesn’t match the default IDS signature and gets through it.

Hope it helps, any confusion you may ask!

what is the key differentiator of conversational Artificial Inelligence?

Answers

The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

What is Natural Language Understanding?

This is known to be the key differentiator in terms of conversational AI from traditional ones and it is one that is often  to help or bring about natural conversations.

Note that The  key differentiator of conversational Artificial Intelligence  is Natural Language Understanding.

Learn more about Artificial Intelligence from

https://brainly.com/question/25523571

#SPJ1

QUESTION 9
Alex wants to center the title and his name on his cover page. Which of the following buttons should he press?

Answers

Alex if he wants to center the title and his name on his cover page, he has to press centered.

What are  cover page?

Cover pages is known to be the page that is made up of the title of sny article, books etc. It also include the name of your school, course name, etc.

Therefore, Alex if he wants to center the title and his name on his cover page, he has to press centered so as to be in the middle top of the document.

Learn more about cover page from

https://brainly.com/question/3602860

#SPJ1

Two adults and two children are on the left side of the river. They all want to cross to the right side of the river. However, the only means of transportation they can use is a boat (also initially on the left bank) which can carry either just one adult or one adult and one child or just one child or two children from one bank to the other bank. Any adult or child can operate the boat, but the boat cannot be operated without having at least one person on the boat. The goal is to come up with a plan for moving everyone from the left side to the right side using multiple boat trips. Describe the initial state and the goal, using PDDL. Define appropriate actions for this planning problem, in the PDDL language. For each action, provide a name, arguments, preconditions, and effects.

Answers

A plan to move both the adults and two children from the left side of the river to its right side by using multiple boat trips is described through PDDL below.

What is AI?

AI is an abbreviation for Artificial Intelligence and it can be defined as a subfield in computer science that deals with the use of advanced computer algorithms and technology to develop an intelligent, smart computer-controlled robot with the abilities to proffer solutions to very complex problems.

What is PDDL?

PDDL is an abbreviation for Planning Domain Definition Language and it can be defined as a group of programming languages which are designed and developed to avail an end user the ability to define a planning problem.

A plan to move both the adults and two children from the left side of the river to its right side by using multiple boat trips is described through PDDL as follows:

(adult1 Adult)

(adult2 Adult)

(child1 Child)

(child2 Child)

(boat Boat)

(preconditions

       (left adult1) (left adult2) (left child1) (left child2) (left boat))

(effects

       (right adult1) (right adult2) (right child1) (right child1) (right boat))

For each action, a name, preconditions, arguments, and effects are provided as follows:

(operator

       travel-adult

       (parameters

       (<adult> Adult) (<boat> Boat))

   (preconditions

       (left <adult>) (left <boat>))

   (effects

       (right <adult>) (right<boat>) (del left <adult>) (del left <boat>)))

(operator

   travel-child-right

   (parameters

       (<child1> Child) (<child2> Child) (<boat> Boat))

   (preconditions

       (left <child1>) (left <child2>) (left <boat>))

   (effects

       (right <child1>) (right <child2>) (right <boat>) (del left <child2>) (del left <child2>)

(del left <boat>)))

(operator

   travel-child-left

   (parameters

       (<child1> Child) (boat Boat))

   (preconditions

       (right <child1>) (right <boat>))

   (effects

       (left <child1>) (left <boat>) (del right <child1>) (del right <boat>)))

By using a Planning Domain Definition Language (PDDL), the initial state and goal state are specified as follows:

Initial State: left(child1), left(child2), left(adult1), left(adult2) and left(boat).Goal State: right(child1), right(child2), right(adult1), right(adult2) and right(boat).

Read more on PDDL here: https://brainly.com/question/15993488

#SPJ1

You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report needs to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.

Answers

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

Issue of  internal policy violation

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

https://brainly.com/question/13198827

#SPJ1

You created a photo album with transitions and want to send it to friens

Answers

Answer:

do not cheat in your exam

Answer:

C.All the negative things the other person has said or done to you

Explanation:

What does the term "classical computer" refer to?

Answers

Classical computing is another name for binary computing. In this traditional approach to computing, information is stored in bits that are represented logically by either a 0 (off) or a 1 (on). Today's processors, including x86 and ARM processors, support classical computing.

Which transactions in the lab used TCP protocol? which used UDP? Which ports were used in the lab?

Answers

The transactions in the lab used TCP protocol are: FTP (port 21), SSH (port 22), and Telnet (port 23) used TCP.

What protocols are used in TCP?

A high-level protocols is one that often need to moves data to all use TCP Protocol.

Note that an Examples is made up of peer-to-peer sharing methods such as File Transfer Protocol (FTP), Secure Shell (SSH), and Telnet.

Why use UDP?

UDP is known to be one that helps to fasten or speeds up the rate of transmissions by aiding or helping in the transfer of data before any form of an agreement is given by the receiving party.

Hence, The transactions in the lab used TCP protocol are: FTP (port 21), SSH (port 22), and Telnet (port 23) used TCP.

Learn more about TCP protocol from

https://brainly.com/question/17387945

#SPJ1

How can you ensure that your internet search is happening over a secure network connection?.

Answers

Answer:

Rename Routers and Networks.

Use strong passwords.

Keep everything updated.

Turn on encryption.

Use multiple firewalls.

Turn off the WPS setting.

Use a VPN

Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​

Answers

The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

What is the physical safety about?

There are a lot of of physical safety issues that can come up from using ICT devices.

A fire outbreak can occur if there is an issue with the wiring of the computer system or when there is too much voltage supplied and this is therefore a type of physical safety issues in the computer room.

Note that Electrocution is said to be the death or bad injury that is known to be caused as a result of an electric shock from electric current that tends to pass through the body.

Hence, The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

Learn more about Electrocution from

https://brainly.com/question/1810934

#SPJ1

All of the following are likely to be the benefits of a college graduate except:

a.
Greater job satisfaction

b.
Earn less money over time

c.
Improved health and wellness

d.
Better job stability

Answers

B. Earn less money over time

Over time, the interest is added to the principal, earning more interest. That's the power of compounding interest. If it is not invested, the value of the money erodes over time.

What describes Accenture's approach to automation?

cloud-centered

human-centered

machine-centered

intelligence-centered

I don't know this yet.

Answers

Answer:

intelligence - centered

Explanation:

I hope it helps you

two types of storage memory​

Answers

Answer:

Primary and Secondary memory

Primary memory includes ROM and RAM

Secondary memory includes CD, hard drive, etc

Describe the five components of a computer

Answers

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.

Answers

In the case above, her system have been hack because she was taken to an alternative site which is used by hackers to deceive people. Since she could not find the file, the best thing to do is to use an antivirus that can prevent the malicious software from invading her system or call a professional.

What is a system attack?

A cyber attack is known to be when a person attempt to get an unauthorized access to a computer and this is done as they try to alter, block, manipulate or steal the data that is seen within the systems.

In the case above, her system have been hack because she was taken to an alternative site which is used by hackers to deceive people. Since she could not find the file, the best thing to do is to use an antivirus that can prevent the malicious software from invading her system or call a professional.

Learn more about system attack from

https://brainly.com/question/26199042

#SPJ1

11. Written and artistic expressions are protected by
A. digital ethics.
OB. intellectual property law.
0000
OC. infringement.
D. social media.

Answers

Answer:

B

Explanation:

Written and artistic expressions are protected by intellectual property law.

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.
What is the probability that a

Answers

The probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

What is the probability about?

Probability is  known to be the way or the measurement of the likelihood that a given event  will take place.

Note that in the case above, the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.

See full question below

The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.

What is the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to complete the race?

Learn more about race from

https://brainly.com/question/28062418

#SPJ1

If given program is executed, what will be output?

Create Stack<Integer>

Queue<Integer> queue = new LinkedList<Integer>;

Create LinkedList<Integer> ll;

int[] array = { 16, 22, 399, 214, 351 };



for (i = 0; i < array.length; i++) {

int x = array[i];

if (i % 2 == 0)

addLast(x) in ll;

else

push(x) on stack;

}

while (“stack is not empty” || “linked list is not empty”) {

if (stack is not empty)

queue.enqueue(stack.pop());

if (“linked list is not empty”)

queue.enqueue(ll.removeLast());

if “queue is not empty”)

print("I am " + queue.getFront();}

Answers

Answer:

16 22 399 214 351

Explanation:

es 1 .22 399 480

Using the knowledge in computational language in JAVA it is possible to write a code that joins the data placed in the code and outputs a value.

Writting the code in JAVA:

import java.util.LinkedList;

import java.util.Queue;

import java.util.Stack;

public class ReversingTheFirstKElementsOfAQueue{

static Queue<Integer> queue;

static void reverseQueueFirstKElements(int k)

{

if (queue.isEmpty() == true

|| k > queue.size())

return;

if (k <= 0)

return;

Stack<Integer> stack = new Stack<Integer>();

for (int i = 0; i < k; i++) {

stack.push(queue.peek());

queue.remove();

}

while (!stack.empty()) {

queue.add(stack.peek());

stack.pop();

}

for (int i = 0; i < queue.size() - k; i++) {

queue.add(queue.peek());

queue.remove();

}

}

static void Print()

{

while (!queue.isEmpty()) {

System.out.print(queue.peek() + " ");

queue.remove();

}

}

public static void main(String args[])

{

queue = new LinkedList<Integer>();

queue.add(1);

queue.add(2);

queue.add(3);

queue.add(4);

queue.add(5);

int k = 3;

reverseQueueFirstKElements(k);

Print();

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write an algorithm and flowchart for finding the area of a rectangle

Answers

Hi! I don't have an answer but someone asked the exact same question and someone answered with both the algorithm and flowchart for the rectangle.

hope this helps!

https://brainly.in/question/15178855

how could this code be simplified?

Answers

The code to be simplified is not indicated but I will give you a general guide to simplifying Java codes.

How do you simplify Java Code?

At the top, declare and initialize your variables. Late declaration disrupts readability.Create specific functions that are modular. It is inefficient to have functions that attempt to "do it all". Make it a practice to name the function to correspond to the task.All duplications must be removed and rectifiedHaving comments provide a fantastic way to summarize the purpose of a code.Do not overuse recursion. Doing this makes it difficult to understand at a glance.If possible, do not use global variables. The local variable takes precedence over the global variable in JavaScript.

Learn more about Java code at;
https://brainly.com/question/18554491
#SPJ1

Other Questions
3x(x2), when x=7 I am giving out the crown to people who gets the answer right :) !!!!!!!!!!! Paula is going to hire a makeup artist for a fashion show and is comparing prices. Shelley charges $40 as a booking fee and an additional $30 per hour. Ezra charges $35 per hour, plus a booking fee of $30. Depending on the length of the show, the cost could end up being the same for either artist. What would the cost be? Simplify to a single power of 5 Vision is the guiding image of your life. It is the projected outcome that you can see with your mind's eye.TrueFalse When do Florida plants prepare themselves for the cold winter temperatures? (1 point) aBeginning of the spring bDuring the fall cEnd of the spring dEnd of the summerPLEASE HELP ASAP!!! >. ILL MARK U BRAINLEST Find the circumference of the circle. Use 3.14 for 1. Round to the nearest hundredth, if necessary.is9 in.The circumference of the circle is aboutinches.1 The lobes are important for speech and language. O A. parietal O B. temporal o o C. frontal O D. occipital which amendment banned slavery in the US LOOK IF YOU DONT KNOW HOW TO PARAPHRASE JUST USE THIS WEBSITE AND TEACHERS NEVER NOTICE BOOK MARK IT IT WILL HELP YOU This discussion has 2 parts:_______. Part 1: Generate a list of all of the attributes that make you...you. Things that are essential to who you are, that influence your decisions, and your behaviors. These could also be personality traits or other influential items. Part 2: Rank order these items in order of importance...so put a number 1 next to the most central or important item, number 2 next to the second most important etc... If you have a long list, only do the top 5. Part 3 (o.k., I lied it's a 3 part question). Post your top 5 here and talk about how those five items influence the manner in which you communicate and engage with people. How do these influence and guide your daily behaviors? a ball rolled a velocity of 20m/s after 5s it comes to stop what is the acceleration of the ball Which statement best explains how the gases of the atmosphere affect the temperature of Earth? Graph and then find the perimeter of this shape. H(3, 0), I(3, 7), J(6, 7), K(6, 0) Esta es la historia de un chico trabajador que, como todo el mundo lleva una vida muy rutinaria. En la cual rutina era muy aburrida; ya que estaba en otro mundo. Un da mirando por la ventana. El edificio del frente donde cruz las miradas con una joven chica, la cual se comunicaban mediante carteles. Tanta fue la amistad de estos chicos que sin querer se llegaron a gustar, pero ninguno de los dos se propona salir. I think I got the answer but I need someone to help what is ergonomic in computer science Ocean waves are hitting a beach with a frequency of 0.100 Hz. Their average wavelength is 15.0 m. What is their average speed? What is the frequency of a pendulum that is moving at 30 m/s with a wavelength of 0.32 m? I am really stressed for my Spanish class any tip's(I really need help in correcting my grammar and all that in Spanish. explain how movements along faults generate earthquakes DUE IN 10 MINUTES PLS HELP!!!