1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
4 years ago
15

Which is not a common value among 6- to 11-year-old children? dressing like adults protecting friends keeping secrets from adult

s blending in with peers?
Social Studies
1 answer:
GrogVix [38]4 years ago
3 0
The three values of 6 - 11 year old children are as follows:
1. protect your friends2. don't tell adults what's happening3. don't be too different from your peers
So from the given options, dressing up like adults are not one of it so therefore that is the answer.
You might be interested in
Several days into the study, some of the students in the math-based reading program were getting frustrated by the frequent ques
weqwewe [10]

Answer:

The internal validity threat that is most likely occurring in this scenario is:

Selection threat.

Explanation:

Selection threat or bias results from how groups were selected for the test, especially when the different groups were not comparable before the study.  For example, some of the students were frustrated by the frequent questions from their teacher.  They wanted quick progress, and as a result, started acting out.  Grouping these students together as a control group creates a threat called a selection bias or selection threat.  It shows that any other factor (reading on their own and no participation in the math-based reading program) than the reading program leads to the post-test differences between the groups.

8 0
3 years ago
Prior to 2013 and 2014, the most famous breaches infiltrated the systems at _____, target, home depot, and anthem blue cross
ziro4ka [17]

Prior to 2013 and 2014, the most famous breaches infiltrated the systems at eBay {twice} target, home depot, and anthem blue cross.

A cyberattack that results in a data breach is one in which private, sensitive information that should have been kept private has been accessed or disclosed without authorization.

When a user clicks on an attachment, connects to a public WIFI network, or clicks a link to a legitimate-looking website, they may not realize they are exposing a security breach. Employees using their personal laptops outside of the office are not considered harmful to the company by the executive.

This is the specify reason for breach because it give access to hacker and t he  company become vulnerable to hacking. This took place in the instance of eBay.

To learn more about eBay security here

brainly.com/question/13463763

#SPJ4

3 0
1 year ago
How are benign tumors and malignant tumors related?
kotykmax [81]

Bening Tumors are not cancerous and Malignant rumors are cancerous

3 0
4 years ago
C. Evaluate Do you think nonviolent resistance is<br> an effective form of protest? Why or why not?
hjlf

Answer:

Some of the time it is and some of the time it isnt.

Explanation:

However most of the time it is. This is because when people silently protest they create problems for the economy and then the people they are fighting against have no goods that they need to fight with. It is also very effective because it shows that these people are not going to fight back physically. That means that the "bad guys" will probably lose interest.

6 0
3 years ago
What are 5 individual sports that can be played during physical education?
Archy [21]

Answer:

1. Badmition

2.Weightlifting

3.Running

4.Bowling

5.Diving

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Always adjust mirrors after adjusting your seat
    9·2 answers
  • List three benefits of General Maritime Treaty
    11·1 answer
  • What is one strategy you can use to help when you are feeling stressed or upset?​
    7·1 answer
  • How is a country developed ?
    14·2 answers
  • "George is publishing an article in the field of psychology. He cites articles from other fields as part of his research. The fi
    8·1 answer
  • This question asks about your Independent Reading selection. You may use your reading selection to help you answer the question.
    13·2 answers
  • My amount of money is _ 131,040
    15·1 answer
  • 1.<br>What is meant by human resource?​
    13·1 answer
  • A way of classifying organisms into categories based on their similarities. Question 3 options: cells energy function animals &a
    8·2 answers
  • 1. How can you protect communication with the Kybert Satellite?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!