Answer:
what's the question i can see it on ur profile
Explanation:
1 - e
2 - b
3 - a
4 - c
5 - d
Answer:
d. Persuading a receptionist to give you information
Explanation:
Social engineering attack is used to describe malicious activities accomplished through human interactions, examples are; hacking, dumpster diving, shoulder surfing, phishing, whaling and piggbacking. Soliciting for information from a receptionist is not a social engineering attack.
Answer:
Kelly's covariation theory is an attribution theory that includes behavior made by one person toward another person through continuous observation
Explanation:
Kelly's covariation theory is an attribution theory that includes behavior made by one person toward another person through continuous observation. The main importance of this theory is that it includes the social and self-perception of dealing person.
This theory includes two-aspect i.e. external and internal attribution. in external attribution, people think that change in behavior is due to the external cause while internal attribution involves personal reasons behind the change in behavior.
Answer:
u cant do anything without money
"Stereotype threat" <span>is an individual's fast-acting, self-fulfilling fear of being judged based on a negative idea about his or her group.
Stereotype threat refers to a situational issue in which individuals are or feel themselves to be in danger of fitting in with generalizations about their social gathering. Since its presentation into the scholarly writing, stereotype threat has turned out to be a standout amongst the most broadly contemplated subjects in the field of social psychology.
</span>