The practice in which an African American assumes the identity of a white person in order to take advantage of the privileges and opportunities associated with being American can has been called:

A. Segregation
B. Assimilation
C. Integration
D. Passing


D. Passing

Computer Science & Information Technology

You might also like to view...

Identify the main idea behind the General Public License (GPL) and list three characteristics of software developed under the GPL.

What will be an ideal response?

Computer Science & Information Technology

Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)

A) WLAN B) SSID C) Omnidirectional D) Unidirectional E) Wired Equivalent Protocol (WEP)

Computer Science & Information Technology

You are working on a server that is experiencing issues with a device driver. Under which log should you look for more information regarding the issue?

A. System B. Application C. Security D. Forwarded Events

Computer Science & Information Technology

An access control list specifies the user-ID, the resources available to the user, and the level of permission granted.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology