A person who tries to break into a computer system is called a ____
a.
cracker
b.
hacker
c.
cookie
d.
snoop
ANSWER:
a, b
You might also like to view...
Fernald’s ‘say, spell, then trace the word with one finger’ spelling strategy can be adapted to a variety of learning styles by having students trace the word:
a. in a tray of salt. b. in the air. c. on a student’s back. d. All of the choices are correct.
The functional based assessment can help to identify events, activities, and situations associated with a student's problem behavior and to make __________ that can alter the frequency of such behaviors
a. Environmental adjustments b. Medication decisions c. Instructional decisions d. Punishment decisions
Describe classroom organization as a behavior management prerequisite to include strategies for preventative practices.
What will be an ideal response?
Tai is a college sophomore with numerous interests. Public service has always appealed to her, yet she is not sure if teaching will be the most satisfying career. Which of the following would be the best indicators that Tai would find satisfaction in teaching?
a. She feels a strong desire to contribute to society and wants a secure salary. b. She wants recognition for her work, and she enjoys working with people. c. She enjoys intellectual stimulation and wants to perform a service to society. d. She wants to work with others and desires a work schedule with ample personal time.