The process wherein it involves the circulation of questionnaires among the group members about a specific problem that they want to tackle is termed as the Delphi Technique. The group members should share the results within the circle then they should continue to recirculate and refine individual responses until a consensus regarding the problem is reached.
Having the direct opposite technique with the nominal group technique or the brainstorming, Delphi technique does not require group members to meet face to face.
These are the steps in taking the Delphi technique. The first step is identifying the problem. Next is, the group members shall then be asked to offer their solutions anonymously. They should answer the carefully designed questionnaires. Third, all the answers of all the members are then compiled and are also sent to all members in the group. After each of the members has already carefully evaluated each of the group member’s answers, they are then asked to generate new individual solutions. Lastly, until a consensus problem solution is arrived, steps 3 and 4 will be done repeatedly.
The advantage of practicing the Delphi technique is they do not have to meet face to face. This is important to those members who are geographically separated or to those who are too busy to meet.
Answer:
Answer is Institutional racism.
Explanation:
Institutional racism is a pattern, policy or practice within different institutions such as schools, banks and courts, which has been in existence overtime and has been considered as a normal behavior, to give negative treatment to a certain group of people based on some conditions, e.g color.
Answer:
Network / MAC Sniffing
Explanation:
Network sniffing is the method of intercepting packets of data sent through a network. A specialized software or hardware equipment can do this.
Computer systems interact via IP addresses by broadcasting messages over a network.
When a signal is sent to a system, the receiver's machine with the matching IP address will respond with its MAC address.
MAC Sniffing can:
- <em>Collect sensitive information like login information </em>
- <em>Conduct surveillance on text conversations </em>
- <em>Save files which were transmitted across a network</em>