1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
9

The ____________ is an interest inventory that classifies people according to six different types: Realistic, Investigative, Art

istic, Social, Enterprising, and Conventional. ____________is an aptitude assessment that matches students with study programs at specific colleges and universities.
1.) a.) kuder occupational interest survey b.) self directed search c.) campbell interest inventory 

2.) a.) GATB b.) MBTI c.) FOCUS2
Computers and Technology
2 answers:
Kamila [148]3 years ago
7 0
1) C) Campbell Interest Inventory.

Also known as the Strong Interest Inventory, this was developed based on the Holland Codes (6 traits listed in the question), it was developed by psychiatrist Edward Strong and later revised by David Campbell. 

2) C) FOCUS2

The FOCUS2 test is a test that matches students with study programs based on their assessed aptitudes and interests. <span />
jenyasd209 [6]3 years ago
7 0

The answer for the first blank space is (B) Self-directed search, also known as the Holland Code Career Test, which provides students with the best three career groups that are most suitable to their interests, from the six types mentioned in the question.

The answer to the second blank space is (C) FOCUS2, a test that assesses your suitability for certain careers and college majors.  

You might be interested in
An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
Flura [38]

Answer:

D. Operating system

Explanation:

A keyboard is a secondary item like a mouse and is not apart of computer hardware and app is also not a computer hardware because its coding not hardware. Web Browser is a Internet thing not hardware.

4 0
3 years ago
Read 2 more answers
A large number of genetic codes are stored as binary values in a list. Which one of the following conditions must be true in ord
Bad White [126]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
ira [324]
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

4 0
3 years ago
When you pass an array as an argument to a function, the function can modify the contents of the array?
taurus [48]
In most languages. Primitive data types ( char, int, float, bool, maybe string ) are usually passed by value, but compound data types are passed by reference, so you're not working on a copy but on the original.
8 0
3 years ago
3. Which of the following is a single piece of information related to the person, place,
stepan [7]
I think the answer is field
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is a Limited Purpose credit card
    11·2 answers
  • Meg is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding techniq
    10·1 answer
  • What is Mainframe computer​
    15·1 answer
  • What do you call the destination router on the network endpoint?
    7·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • What are the reasonsfor documenting business rules​
    6·1 answer
  • Describe five examples of civil engineering projects.
    6·1 answer
  • Whay is processing?Explain with an example.​
    9·2 answers
  • Effective scrum masters apply which coaching behavior
    5·1 answer
  • So I tried asking for help with my code on stackoverflow but the people there were very condescending and mean plus my questions
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!