Michael was a prisoner of war in Vietnam for nine years. Every day he was exposed to dangerous situations. Every day he thought might be his last day alive. In 1972, Michael was freed as part of a prisoner exchange
Although he appeared in good health when he was released, a year later he had developed cancer that would eventually kill him. How might Selye's GAS explain this?
a) Because of his ordeal, Michael was in the fatigue stage.
b) Michael's body had become exhausted
c) Michael was likely exposed to Agent Orange
d) Michael was poorly prepared for the stress of war
b
You might also like to view...
Answer the following statements true (T) or false (F)
1. The need for belongingness and love sits atop Maslow's hierarchy of needs. 2. The most deferrable need, according to Maslow, is the need for self-actualization. 3. The more basic a need is, the lower its place in Maslow's hierarchy. 4. If your body needs energy, it sends an orexigenic signal to tell the brain to switch hunger on. 5. Ghrelin is an orexigenic signal.
Dispositional attributions include all of the following EXCEPT:
a. luck b. abilities c. intent d. exertion
A local microbrewery believes it produces the best tasting dark beer in town. To make its case, seven volunteers are asked to participate in a beer tasting contest. Each volunteer is asked to taste 5 dark beers and to pick the one he/she prefers. Of the 5 dark beers, one is microbrewery's and the other 4 are national favorites. What is the probability that at least 5 of the volunteers pick the
microbrewery's beer? Assume there is no taste preference for any of the beers and that chance alone determines each selection. a. 0.0000 c. 0.0129 b. 0.0047 d. 0.0043
Using smartphones to store personal and health data presents some ethical concerns. What are some of the ethical concerns discussed in the chapter?
a) identity theft, privacy infringement, and inappropriate use of data b) privacy infringement, possible addiction, and curated information based on user behavior c) inappropriate use of data, identity theft, and curated information based on user behavior d) possible addiction, identity theft, and government monitoring programs