What is the main basis on which sociologists have classified societies in human history

Answers

Answer 1
Answer:

Answer:

d) subsistence technology

Explanation:

Subsistence technology is the main basis on which sociologists have classified societies in human history. It refers to the tools and strategies applied and used by the primitive human population for hunting and gathering their food and other needs, in order to sustain their life.


Related Questions

Phyllis tends to wear very revealing clothing, spends a great deal of time on her appearance, is constantly fishing for compliments, and is easily hurt if someone does not compliment her beauty and fashion sense on a daily basis. according to freud, phyllis was fixated at the
Why did some Jews believe jesus to be the messiah?
Who was the Prime Minister of Great Britain from 1940-1945 during World War II
What is McCulloch vs Maryland?
The strengths perspective is a framework for practice that dictates building on clients' strengths to create positive change.True/False

Is work small?why should we respect the labour?​

Answers

YwfqvayrR55u318(Kurdish’s

The developmental approach to labeling (A) defines normal according to standards established by a given culture.
(B) is based on an individual's deviations from an average in the areas of physical, social, and intellectual growth
(C) reflects an individual's perceptions about himself/herself.
(D) defines normal as the absence of psychological abnormality

Answers

The answer is letter B.

Explanation: Developmental Approach to Labeling focuses on social, personal, language, physical and other forms of growth. the cultural approach to labeling focuses on the culture of the people.

The cultural approach explains behavior in terms of the norms and values in the society.

It can defines normal according to standards.

Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created to cover her tracks. what general term describes susan's actions?'

Answers

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Further Explanation

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of tasks for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  

Learn more:

  • What is computer hacking?

        brainly.com/question/1557021

Keywords: hacking, stealing, cyber security, programming, vulnerability, privacy violation, cyber attack

2. What were the two types of Greek theater?Drama and romance
Song and dance
Action and horror
Comedy and tragedy

Answers

Comedy and Tragedy were two types of Greek theater

Answer:

Action and horror are the 2 types of Greek theater

Egyptians were most interested in the trade of Nubians product?A. fragrances
B. silver
C. gold
D. wood
Please help! Thx!​

Answers

Answer:

Gold

Explanation:

Answer:

C. Gold

Explanation:

EDGE2021

Original : Many physical education and health curricula have been developed to foster active, healthy lifestyles through various learning outcomes and objectives. Although such a goal may be desired and valued by our society, ways to achieve this goal are less understood. If elementary physical education is to assist children in developing skills and understanding that will serve as the foundation for future activities, then educators at all levels need to develop ways to foster these skills and understanding across numerous types of activities.

Student:

While society may broadly appreciate and desire educational objectives that can help people lead healthy lives, the exact approaches necessary to reach these desired outcomes are not well understood. Mandigo and Anderson (2003) highlight the need for educators "to develop ways to foster these skills and understandings across numerous types of activities" (p. 8) as an important step towards making this desire a reality.

Which of the following is true for the Student Version above?

A. Word-for-Word plagiarism
B. Paraphrasing plagiarism
C. This is not plagiarism

Answers

Answer: THIS IS NOT PLAGIARISM.

Explanation: Plagiarism is the use of someones literature work without acknowledging the person. It is a theft of knowledge in it's simplest term. But when acknowledged it is assumed to be a borrow of knowledge, which is always acceptable because no one knows everything.

The student has acknowledged the source that was cited to build it's literature work, so therefore it is legal for the student to copy as much information from the book, be it paraphrasing of Word-for-word.

Answer: C. This is not Plagiarism.

Explanation: In the student version, he or she neither copied the original content word for word without enclosing them in a quotation marks nor copied the structure of the statement.

The student kept the original meaning without copying word for word as well as the structure.

Also he cited and enclosed the the statement he copied to show he just borrowed them and it was his or her original idea. So this is not Plagiarism