1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
13

"Cathy, a supporter of gay rights, is of the opinion that promoting gay marriages is attempting to become like the dominant grou

p and adopting their social practices. She thinks that when individuals forsake their own attributes to become a part of a different culture, it is a waste of energy. Cathy is referring to ________ of gays."
Social Studies
1 answer:
andrezito [222]3 years ago
5 0

Answer:

"Cathy, a supporter of gay rights, is of the opinion that promoting gay marriages is attempting to become like the dominant group and adopting their social practices. She thinks that when individuals forsake their own attributes to become a part of a different culture, it is a waste of energy. Cathy is referring to <u>assimilation </u>of gays."

Explanation:

Cultural assimilation, or 'assimilation' for short is an intense process of consistent integration when members of an ethno-cultural group, typically immigrants, or other minority groups.

You might be interested in
What are some of the similarities and differences between different indigenous groups experiences with colonialism?
Daniel [21]

Answer:

Similarities:
Disease wipes out native populations
Trading with Europeans
Assimilation

Differences:
Encomienda System (Spanish & Southern Indigenous People)
French Fur Trades & Alliances with Native Populations in what is now Canada.

Explanation:

6 0
2 years ago
Read 2 more answers
Suppose you come across a car accident at an intersection and observe that a small car is severely damaged and a large SUV appea
tatiyna

Answer:

The answer is - Inferences

Explanation:

The options are:

A. contaminated observations.

B. inferences.

C. distorted behaviors.

D. illusory correlations.

The answer is B- inferences

Inference can be defined as a logical conclusion which is gotten on the basis of evidence and logical reasoning and through the use of knowledge and information.

In the scenario here, it is reasonable to infer that the SUV hit the smaller car due to the evidence that the smaller car is damaged while the SUV which is bigger only has a headlight broken.

4 0
3 years ago
Which attack occurs when the attacker is able to browse for directories and files outside the normal application access?
Damm [24]

Directory traversal.

Directory traversal (path traversal) happens when the attacker is in a position to read files on the online server outside of the directory of the website. Properly controlling access to an online page is crucial for running a secure web server. Directory traversal or Path Traversal is an HTTP attack that enables attackers to access restricted directories and execute commands outside of the online server’s root directory.

With a system at risk of directory traversal, an attacker can make use of this vulnerability to get out of the foundation directory and access other parts of the classification system. This might give the attacker the power to look at restricted files, which could provide the attacker with more information required to further compromise the system.

Therefore it all depends on what the website user has been given access to within the system. Apart from vulnerabilities within the code, even the net server itself will be receptive to directory traversal attacks. the matter can either be incorporated into the net server software or inside some sample script files left available on the server.  

while you may be employing a web server software version that has fixed this vulnerability, you would possibly still have some sensitive default script directories exposed which are well-known to hackers. The best thanks to check whether your website and web applications are prone to directory traversal attacks are by employing a Web Vulnerability Scanner.

learn more about directories and files: brainly.com/question/20787793

#SPJ4

4 0
2 years ago
Help me out with this Please i need it ASAP​
Ierofanga [76]

Answer:hi

Explanation:

i am sorry i do not speak that language

7 0
3 years ago
What happened at the Constitutional Convention?
tatyana61 [14]

Answer:

The Constitutional Convention assembled in Philadelphia in May of 1787. The delegates shuttered the windows of the State House and swore secrecy so they could speak freely. Although they had gathered to revise the Articles of Confederation, by mid-June they had decided to completely redesign the government.

6 0
3 years ago
Read 2 more answers
Other questions:
  • According to sociologist Alison Pugh, low income families tend to engage in what she calls symbolic indulgence for their childre
    12·1 answer
  • What set Pennsylvania apart from other colonies?
    13·1 answer
  • What is a mixed economy?
    8·1 answer
  • Which type of differential reinforcement is most likely to lead to an increase in an alternative behavior? a. DRL b. DRO c. DRM
    15·1 answer
  • As a software development project manager, Grant is extremely busy working on new products as well as improving old ones and fix
    13·1 answer
  • mportant events in 1968 include John and Paul discussing Apple Corp. on American TV, and Paul meeting his future wife _________,
    12·1 answer
  • Describe. the role of soil in plant growth
    5·1 answer
  • Who is the prophet of social justice:
    9·2 answers
  • Benz always tries to be honest with her clients, and she never becomes defensive, even if the clients ridicule her feedback or h
    14·1 answer
  • What would have<br> been the Federalist response? What does the Constitution "say"?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!