1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
4 years ago
12

Please identify three examples of how the United States is heteronormative

Computers and Technology
1 answer:
juin [17]4 years ago
5 0

Answer:

Well, let's say you're out at a bar. A friend of yours sees a cute guy, but she's hesitant to make the first move because she assumes the guy would be turned off by that - because we're socialized to believe that women shouldn't approach men like that, lest they come off as desperate. That's heteronormativity.

When she finally gets the courage to go up and talk to him, he begins to call her infantilizing pet names (like honey, baby, and sweetheart) - which would be fine if they'd agreed upon it, but he's just assuming she's cool with it! That's heteronormativity.

When she begins to get uncomfortable by these names, she gets up and leaves. But the guy says something like, "Oh, come on! Women are so sensitive. What's your problem?" That's heteronormativity.

You might be interested in
How has the internet improved business communication worldwide
emmasim [6.3K]

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

4 0
2 years ago
A powerful computer that acts as a hub for other computers is a called a ______.
zhannawk [14.2K]
It is called a server
7 0
3 years ago
Read 2 more answers
if the input message is omitted when creating a data validation rule for a cell, no message will appear when the user selects th
pochemuha

Answer:

True.

Explanation:

If the input message is omitted when creating a data validation rule for a cell, no message will appear when the user selects the cell. Data validation rules are used to define the type of data that can be entered into a cell, and the input message is an optional feature that allows you to provide a custom message to the user when they select the cell. If the input message is not specified, no message will be displayed when the user selects the cell.

6 0
1 year ago
A teacher uses the spreadsheet below to determine the average quiz score of each student. The teacher inserts this information i
Vinvika [58]

need help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

6 0
4 years ago
Read 2 more answers
The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
Flura [38]

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

5 0
3 years ago
Other questions:
  • Array elements must be ________ before a binary search can be performed.
    8·1 answer
  • What does confidentiality of data refer to?
    6·2 answers
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • What is the possible output from system.out.println((int)math.random() * 4)?
    8·1 answer
  • What is the clearing house for domain names called?
    12·1 answer
  • Which is an example of a table style option?
    7·1 answer
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP
    12·2 answers
  • def list_length(shrinking_list): ''' A recursive way to count the number of items in a list. ''' if shrinking_list
    10·1 answer
  • Can someone help on number 8? Plz
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!