1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
11

Dr. Schmidt is interested in how children interact with their parents during play. She collects data from hundreds of hours of o

bservation of children playing at home with their parents. She is using:
O an empirical approach.
O humanistic psychology
O the biopsychosocial perspective.
O structuralism
Advanced Placement (AP)
1 answer:
Nikolay [14]3 years ago
7 0

Answer:

Humanistic psychology

Explanation:

Hope it helps

You might be interested in
What step in the “5-Step Model for Solving Problems” do you think is the easiest and which step is the most challenging to accom
faust18 [17]

Answer:

Explanation:

Define the problem.

Gather information.

Generate possible solutions.

Evaluate ideas and then choose one.

Evaluate.

these are the steps to problem solving, i would say defining the problem is the easiet and evaluating is the harderst. mostly because evaulating is where you make the most errors and defining is basically reading and highlighting, you can use the 5-Step Model to solve relationship problems such as communication or lack of thereof and figuring out how to complete a task a manager gave you

7 0
2 years ago
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
Elena-2011 [213]

Answer: a. Unauthorized individuals can use data mining and other techniques to guess a user’s password.

Explanation:

In a case whereby a weak password is used, devices and information can be susceptible to unauthorized access as the unauthorized individuals can use data mining and every other methods in order to guess the user's password.

Data mining has to do with finding patterns and anomalies, within large data sets in order to forecast outcomes. Once, the password of the user has been gotten, this can be used for either fraudulent activities or every other thing that the hacker intends to do.

6 0
3 years ago
A car moving at 15 m/s skids to a stop in 20m. If the car travels at 30 m/s, how far will it skid, assuming the same constant br
nydimaria [60]
Answer
3000000/$-9-! maj
3 0
3 years ago
Why were europeans interested in colonizing africa?
Veronika [31]

Well, the Europeans were first interested in colonizing Africa because of trying to find a trade route to Asia. The land route was too expensive because of the taxes and too long. Later on, however, Europeans discovered natural resources, so the Europeans went deeper into Africa. After that, the Europeans are interested in the slave trade and start to kidnap Africans and sell them into their own homeland country.

7 0
2 years ago
Who on here is good at advanced math? If you are could you please friend me on here? I ask a lot of math questions that no one a
Annette [7]

Answer:

friend me i can help a bit

Explanation:

5 0
3 years ago
Other questions:
  • A student should be most cautious using a web address ending in .
    15·2 answers
  • True or false- Gneiss is formed. The mineral grains in granite are flattened under pressure.
    8·1 answer
  • Help please! "A Visit of Charity"
    6·2 answers
  • Oxygen’s atomic number is 8. This means that an oxygen atom has
    10·2 answers
  • Paano maituturing ang isang suliranin na isang kontemporaryong isyu​
    8·1 answer
  • Kim is looking down at her hands. Which specialized area of the cortex is being activated?
    6·1 answer
  • The treble clef establishes the note on the second
    12·2 answers
  • explain one reason that the Mughal leaders constructed impressive buildings for worship and as memorials
    13·1 answer
  • Hi there amigos (: yo mama
    8·2 answers
  • Once a theory is validated, it is easily discarded.<br><br> False<br><br> True
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!