1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
12

We cannot unlock our child from the closet because if we do, she will want to roam the house. If we let her roam the house, she

will want to roam the neighborhood. If she roams the neighborhood, she will get picked up by a stranger in a van, who will sell her in a sex slavery ring in some other country. Therefore, we should keep her locked up in the closet.
Explanation: In this example, it starts out with reasonable effects to the causes. For example, yes, if the child is allowed to go free in her room, she would most likely want to roam the house -- 95% probability estimate[1]. Sure, if she roams the house, she will probably want the freedom of going outside, but not necessarily "roaming the neighborhood", but let’s give that a probability of say 10%. Now we start to get very improbable. The chances of her getting picked up by a stranger (.05%) in a van (35%) to sell her into sex slavery (.07%) in another country (40%) is next to nothing when you do all the math:

.95 x .10 x .0005 x .35 x .0007 x .4 = about 1 in 25,000,000.

Morality and legality aside, is it really worth it to keep a child locked in a closet based on those odds?
Social Studies
1 answer:
Alexus [3.1K]3 years ago
3 0

Answer:

No

Explanation:

Even if you, as a parent, can actually leave morality and legality aside - which is pretty difficult, if not impossible - your decision of keeping the child locked, in order to protect her from something very unlikely, will only lead to very negative behaviour of the child that will be much more likely.

You might be interested in
10 aspects regarding the crusades
Aleonysh [2.5K]

Answer:?

Explanation:

3 0
3 years ago
Read 2 more answers
How was technology different prior to WWII to after WWII
Stels [109]

Answer:

the reasons for technology advancing  after wwII include the fact that the war itself was a very large driver of technical development.  an I-phone is considerably more powerful than a whole planeload of radio and radar equipment found in the most sophisticated wwII aircraft

Explanation:

7 0
3 years ago
Sarah has a robust following on several social networking sites where she shares scrapbooking project ideas and digital photo ad
Tomtit [17]

Answer:    Online retailing

Explanation:  Online retailing or what is called electronic tailing (e-tailing) is nothing but online sales where someone can sell services and goods, intellectual property, etc. It is a matter of retailing like when you go to a store and buy something for your needs, only this is done electronically here, i.e. through online shopping. Online retailing can take place between a seller and a buyer, or also between two sellers or two businesses, known as B2B.

3 0
3 years ago
Which of our focus countries has the LEAST free economy?
Hunter-Best [27]
The answer is —-> mexico
3 0
3 years ago
Which term refers to the process of creating and deploying applications that are secure from the start Brainly?
alexgriva [62]

DevOps. Considering application and infrastructure security from the outset is DevSecOps is all about.

Development plus security plus operations,:

DevSecOps, is a management strategy that integrates infrastructure as a service (IaaS), security, operations, and application development in an automated, continuous delivery cycle.

In order to improve an organization's capacity to deliver applications and services at high velocity while maintaining security, DevOps Security, also known as DevSecOps, is a set of practices, cultural approaches, and tools that bring together software development (Dev), IT operations (Ops), and security (Sec).

Scanning for security flaws in repository code, early threat modelling, security design reviews, static code analysis, and code reviews are a few instances of DevSecOps procedures.

What does the term DevSecOps refers to ?

it is short for development, security and operations. Its mantra is to make everyone accountable for security with the objective of implementing security decisions and actions at the same scale and speed as development and operations decisions and actions.

What is security in DevOps?

DevOps security is a philosophy that combines three words: development, operations, and security. The goal is to remove any barriers that may exist between software development and IT operations.

Learn more about deploying applications :

brainly.com/question/28046737

#SPJ4

7 0
2 years ago
Other questions:
  • Culture is represented by groups that are characterized by shared attitudes, values, goals, and practices. Please select the bes
    8·2 answers
  • Eric is known for his calm temperament, but one day he yelled at his roommate for not doing the laundry. when asked, eric said h
    5·1 answer
  • According to the map below, if you have it directly west from the Kolkata, which of the following cities would you visit first?
    13·1 answer
  • Explain the Two major problems with this electron dot diagram for the element Nitrogen (N
    12·1 answer
  • One of the major tasks for movies like The Chronicles of Narnia is to create costumes for various species that reflect the mythi
    7·1 answer
  • If "a" offers money to "b" to commit perjury but instead "b" tells the truth while giving testimony in court:
    10·1 answer
  • Identify the correct sentence:______________.
    10·2 answers
  • ¿que esta fomentando el crecimiento descontrolado de la poblacion mundial
    10·1 answer
  • You want to buy a new phone for $150, and still have $500 left in your accounts afterwards. Explain how to determine when you ca
    13·1 answer
  • According to three separate surveys, administered in 1983, 2006, and 2009, which statement about the relationship between stress
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!