Answer:
A. believe that their duty is to comply with basic "MUST" and "MUST NOT" statements in codes of ethics, and nothing more
Explanation:
Counselors often looked upon as someone that can provide 'guidance' from the people who are psychologically unstable and feel uncertain in their life.
Since what they do is technically just an advice, there is no definite guidelines on the things that they should say for each problems. Because of this, they are required to give advice on mandatory ethics.
This give them the flexibility in their advice as long as their comply with basic "MUST" and "MUST NOT" statements in codes of ethics, and nothing more
Attribution theory : an attempts to understand the behavior another person by attributing our feelings and good will to them
Example : we know someone who are violent. We tend to think, "Oh, his father must be also really violent to him"
hope this helps
Answer:
It would be necessary to focus on the objective information, and also to separate the influence of the present cultural environment from the past events.
Explanation:
In the study of past events, it would be necessary to take into account the idea of being objective towards the information about historical events. Since, it is known that the perception of the present surrounding environment and the social interaction lived by the researcher, could affect the study of past events,. It would be important to draw a line in order to separate the information corresponding to each epoch of time without modifying history by the influence of the present.
The patient must exhibit symptoms
prior to age 7 years.
Ritalin may present brain risks to young people
undiagnosed with Attention deficit Disorder. While the drug improves attention
span in people diagnosed with ADHD, the drug may decrease working memory and
ability to shift attention from one thing to another in persons without ADHD.
Answer:
The correc answer is : True
Explanation:
When talking about computer security, there are services and software products that can be combined to give security related to information stored, as well as for event management. This kind of system provides security alerts in real-time, besides the analysis of them. These warnings are generated by applications and network hardware.