subject
Social Studies, 06.06.2020 19:02 sansyboy7891

A teacher who consistently makes up excuses to his administrator about why his lesson plans are not completed forgets to include responsibility as a character quality in his lecture on character building. The teacher's behavior reflects which of the following defense mechanisms?A. RationalizationB. SublimationC. RepressionD. RegressionE. Displacement

ansver
Answers: 2

Another question on Social Studies

question
Social Studies, 21.06.2019 19:30
What conclusion can be drawn from the information in the chart? a) africa's total number of hiv/aids cases makes up close to 20% of the world's total aids cases. b) poverty and lack of education are the only factors that have pushed the african aids rate to 6.1%. eliminate c) a major challenge facing african governments is finding a way to effectively combat the aids epidemic. d) north american aids rates are lower than the worldwide rate because of extensive government intervention and spending.
Answers: 1
question
Social Studies, 21.06.2019 22:00
How does federalism limit the power of government in the united states? a. it requires the national government to share power with state governments. b. it ensures that one state cannot make laws that affect all the other states. c. it requires the three branches of the national government to share powers. d. it allows the judicial branch to rule on laws that affect the entire country.
Answers: 3
question
Social Studies, 22.06.2019 07:20
Based on your approved case, create fictitious digital evidence. you may use logs from your own computer (no personal information) as a guide or search the internet for samples. these samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference. document who, when, and how the evidence was obtained. remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. if necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation. digital evidence must meet each of the following criteria: some of your digital evidence must be retrieved by computer forensics. some of your digital evidence must be retrieved from log files. digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed. present digital copies of your evidence in text files, screen shots, or pdfs.
Answers: 3
question
Social Studies, 23.06.2019 09:00
Any study/memorization tips? i have exams in a week and it would be great to try suggestions!you ; )
Answers: 1
You know the right answer?
A teacher who consistently makes up excuses to his administrator about why his lesson plans are not...
Questions
question
Geography, 05.04.2020 21:56
question
Mathematics, 05.04.2020 21:56