1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
9

The ____________ is an interest inventory that classifies people according to six different types: Realistic, Investigative, Art

istic, Social, Enterprising, and Conventional. ____________is an aptitude assessment that matches students with study programs at specific colleges and universities.
1.) a.) kuder occupational interest survey b.) self directed search c.) campbell interest inventory 

2.) a.) GATB b.) MBTI c.) FOCUS2
Computers and Technology
2 answers:
Kamila [148]3 years ago
7 0
1) C) Campbell Interest Inventory.

Also known as the Strong Interest Inventory, this was developed based on the Holland Codes (6 traits listed in the question), it was developed by psychiatrist Edward Strong and later revised by David Campbell. 

2) C) FOCUS2

The FOCUS2 test is a test that matches students with study programs based on their assessed aptitudes and interests. <span />
jenyasd209 [6]3 years ago
7 0

The answer for the first blank space is (B) Self-directed search, also known as the Holland Code Career Test, which provides students with the best three career groups that are most suitable to their interests, from the six types mentioned in the question.

The answer to the second blank space is (C) FOCUS2, a test that assesses your suitability for certain careers and college majors.  

You might be interested in
Who was the creator of the game Fnaf?
Lisa [10]
"Scott Cawthon" did that.........
8 0
3 years ago
Read 2 more answers
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
2 years ago
I will mark you as BRAINLIEST if you give me the correct answer of the questions... Pls asap with all details i am time limited
Alex_Xolod [135]

Answer:

11. 1million square decimetres (from online)

20. assuming room is rectangular,

length= (p - 2b)/2

because perimeter= 2 length + 2 breadth for rectangular

6 0
2 years ago
Read 2 more answers
g Create a program that reads a list of states from an input file, puts them in order, and displays the sorted list to the user.
mixas84 [53]

Answer:

Check the explanation

Explanation:

# Step 1

the first thing to execute will be......

f = open("states.txt")

# Step 2

the second step is......

states = []

for line in f:

   states.append(line.strip())

# Step 3:

the third step is to......

for state in sorted(states):

   print(state)

f.close()

3 0
2 years ago
PLEASE HELP, THANK YOU SO MUCH!
ozzi

Answer:

The correct answer is "Once a day".

Explanation:

According to social media marketing, it is a good idea to check your reader at least once a day. Readers help business by tracking what the consumers are seeing and what times of the day. Checking the reader at least once a day help people in marketing to be updated, because people's preference keep changing all the time.

3 0
3 years ago
Other questions:
  • Suppose you are using a Mac to read your e-mail messages, and you receive an
    8·2 answers
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • Which keys should you press to insert a comment? Ctrl+Alt+I Ctrl+Alt+C Ctrl+Alt+O Ctrl+Alt+N Ctrl+Alt+M
    15·1 answer
  • Create an instance of your queue that accepts java.lang.String Objects. Starting with an empty queue, use the enqueue(E e) metho
    15·1 answer
  • ___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
    8·1 answer
  • Count the number of words in the string. A word is one or more non-blank characters separated by one or more blanks. My suggesti
    13·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Xavier wants to print the slides of his PowerPoint presentation to practice and make notes but doesn't want to use too much ink
    5·2 answers
  • A large computer software firm promised a client that it could deliver a new operating system on a tight deadline and put Keith
    10·2 answers
  • Después de un incidente de seguridad del cliente, el equipo realiza un análisis en profundidad de cada paso dado por los atacant
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!