1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
9

While evaluating evidence that seems to confirm a hoped-for finding, people may overlook flaws in the research or argument. this

is an example of the:?
Social Studies
1 answer:
OleMash [197]3 years ago
3 0
The correct answer is the confirmation bias. 

Confirmation bias refers to the phenomenon wherein an individual or researcher tends to interpret and seek out information that confirms his or her preconceived notions of a finding. Confirmation biases are best avoided in research since they lead to statistical errors and compromised validity. 
You might be interested in
HELP ANYONE, PLEASE. TYSM IF U DO :D Will be giving brainilest!
77julia77 [94]

Answer:

indentify a problem

Explanation:

You have to identify most importantly fist.

4 0
2 years ago
After the Ice Age ended, what did the Paleo-Indians do to make sure they had enough food?
natulia [17]

Answer:

It is

Explanation:

Why and how did Paleo - Indians adapt to environmental changes? They where first presented with an abundance of large game animals that they could hunt. When most of the big game animals went extinct. ... Why did Archaic Native Americans shift from big - game hunting to foraging and hunting smaller animals?

8 0
3 years ago
Which of the following is not a requirement to become the President of the United States?
Zigmanuir [339]
Natural born citizen i think
8 0
3 years ago
Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering
Andrew [12]

Answer:

Impersonation

Explanation:

Impersonation - it is one form of social engineering that focuses is to gain access of the network in order to take advantage of the network for committing fraud or finding any theft. it is different from another form of engineering because it doesn't include phone or mail instead it depends on personal communication.

some form of social engineering is phishing, tailgating, pretexting, etc.

8 0
3 years ago
What were three ways that enslaved people resisted slavery?
earnstyle [38]
Historically, enslaved people have resisted slavery through escaping, fighting back with physical violence, and fighting back through words (such as petitions, articles, speeches, etc.)

7 0
3 years ago
Other questions:
  • How do you think the students Greg fights with feel? Why
    15·1 answer
  • How is inequality measured in IHDI?
    9·1 answer
  • Can the governor appoint the lieutenant governor?
    9·2 answers
  • Consuela is organized, careful, and disciplined. She would likely score very highly on a personality test that measures:
    8·1 answer
  • A major cause of political polarization in congress is
    12·1 answer
  • Please help!
    13·1 answer
  • The MOST powerful nonelected position in the Russian government is
    12·2 answers
  • Write two features of peace culture​
    13·2 answers
  • When demonstrating 2022 kicks’ confident handling, what should you point out while turning the steering wheel back and forth?.
    6·1 answer
  • A well-written disaster recovery plan, including well-written desk instructions, will come as a result of the __________ process
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!